I Secured My VoIP Calls on Public Wi-Fi: Here’s How | Brav

I Secured My VoIP Calls on Public Wi-Fi: Here’s How

Table of Contents

TL;DR

  • Unencrypted VoIP can be snatched on public Wi-Fi.
  • TLS secures the call setup; SRTP secures the media.
  • VPN hides traffic from local attackers.
  • Verify encryption with Wireshark.
  • Keep your VoIP app and Wi-Fi secure.

Why This Matters

I was on a conference call in a coffee shop, sipping espresso while my voice ricocheted through an open Wi-Fi network. A rogue laptop in the same room could have captured the entire conversation without me noticing. Anyone who uses VoIP over public Wi-Fi shares that risk. Data sent unencrypted is exposed to anyone who can sniff the packets on the local network.

Unencrypted voice packets are like postcards that anyone can read RFC 3261 — SIP: Session Initiation Protocol (2002) RFC 3711 — Secure Real-time Transport Protocol (2004). Because VoIP turns voice into tiny packets that travel across the internet, a packet sniffer can reconstruct the conversation if the packets are not protected.

Public Wi-Fi is especially dangerous. The Wi-Fi Alliance explains that open or poorly protected networks lack encryption, making them a playground for eavesdroppers Wi-Fi Alliance — Wi-Fi Security (2023).

The Core of VoIP: How It Works

When you speak, your voice is captured by a microphone and chopped into a stream of digital samples. A codec compresses those samples into packets, each packet carrying a small piece of audio plus a routing header. Those packets are sent over the internet to the other party, who reassembles them in order to play the audio back. The whole process happens in real time, so any delay can turn a smooth conversation into a laggy, garbled exchange.

VoIP uses two main protocols: SIP for call setup and teardown, and RTP for the actual audio stream. SIP messages travel on top of TCP, UDP or TLS, while RTP streams usually use UDP. If no encryption is added, both SIP and RTP packets are plain text and can be read or altered by anyone on the same network.

The Silent Threat: Packet Sniffing on Public Wi-Fi

A local attacker can simply turn a laptop into a packet sniffer, put the network interface into promiscuous mode, and capture every packet that passes through the shared Wi-Fi. Wireshark, the de-facto network protocol analyzer, lets anyone filter out the SIP and RTP traffic that belongs to your call. Reassembling the RTP stream produces an audio file that sounds almost identical to the original conversation.

The attacker doesn’t need to break into your phone or install malware. They just need to join the same Wi-Fi network, capture the packets, and later replay them. With enough patience, they can even analyze the call for personal or corporate secrets.

Wireshark can filter RTP packets with a display filter like rtp or sip and reassemble them into an audio file using the built-in RTP player Wireshark — Network Protocol Analyzer (2023).

How I Made My Calls Private

Below are the concrete steps I followed. Copy them, adapt them to your setup, and stay ahead of the sniffers.

1. Pick a Client that Supports TLS and SRTP

Not all VoIP apps enable encryption by default. I used Linphone, an open-source client that lets me explicitly enable TLS for SIP and SRTP for media. In the settings menu, look for “Transport” and switch to “TLS” and enable the SRTP checkbox. Some commercial apps (Skype, Teams) enable encryption automatically, but check their privacy settings anyway.

2. Verify TLS Signaling

Open a new terminal and run tshark -f "port 5060 or port 5061". While you make a call, the capture should show SIP messages that start with INVITE and have the Transport: TLS header. If the protocol shows UDP instead, your call is not protected at the signaling layer.

If you see INVITE SIP/2.0 over TCP with no TLS header, the signaling is plain. Switch the transport to TLS in your client or contact your administrator.

3. Enable SRTP for the Media Stream

SRTP encrypts each RTP packet. In Linphone, enable “SRTP” in the audio settings. When you start a call, capture the traffic again. The RTP stream will now carry encrypted payloads. The packet payload will look like a random blob of bytes rather than recognizable audio samples. If you still see clear audio in the packet payload, SRTP is not active.

4. Add a VPN to Hide the Entire Flow

Even with TLS and SRTP, the network still sees your packets and knows you’re talking to a specific IP address. A VPN creates a secure tunnel that hides the destination and the content from local snoops OpenVPN — VPN Client (2023). I installed the OpenVPN client and used my corporate VPN profile. Once connected, Wireshark shows only a few encrypted packets between my laptop and the VPN gateway. The rest of the VoIP traffic is wrapped inside that tunnel.

If you’re in a public place, make sure the VPN is up before you dial in. Some VPNs also support split tunneling; for maximum privacy, route all traffic through the VPN.

5. Test Your Setup with Wireshark

Take a fresh capture while making a call over your VPN. Look for two things:

  1. SIP packets should have Transport: TLS.
  2. RTP packets should contain encrypted payloads (Payload-Type: 0 but payload data looks random).

If you see plain RTP payload, your SRTP isn’t working. If you see SIP over UDP, your TLS isn’t enabled.

6. Keep Software Updated and Use Secure Wi-Fi

Outdated clients or operating systems often have bugs that bypass encryption. I set my OS and VoIP app to auto-update. I also avoid free Wi-Fi that has no password; I use only networks that require WPA3 or at least WPA2. The Wi-Fi Alliance page tells you the difference between secure and insecure networks Wi-Fi Alliance — Wi-Fi Security (2023).

Encryption Options Comparison

EncryptionProtocolUse CaseLimitation
TLSSIPSecures call setupDoes not encrypt media
SRTPRTPSecures media payloadRequires key agreement; can add jitter
E2EESignal/WhatsApp/FaceTimeEnd-to-end encrypted voiceLimited to app ecosystem; not available in standard VoIP services

Common Pitfalls & Edge Cases

  • Quality vs. Security: Enabling SRTP can introduce a slight delay due to encryption overhead. On very weak connections, you may notice a drop in audio quality.
  • Misconfigured TLS: If your SIP server uses a self-signed certificate, your client might refuse the call or drop encryption. Verify the server’s certificate chain.
  • VPN Performance: A VPN can add latency. Test your call quality with and without the VPN to find a balance.
  • App-level Encryption: Some enterprise VoIP solutions disable end-to-end encryption to enforce corporate monitoring. In that case, only TLS and SRTP are available.
  • Replay Attacks: Even if a packet is encrypted, a clever attacker can replay the encrypted stream to a different endpoint if the cryptographic counter is not properly advanced. SRTP’s replay protection mitigates this.

Quick FAQ

  1. What encryption does Signal use for voice calls? Signal uses its own E2EE protocol based on the Signal Protocol, which includes the Double Ratchet algorithm and X3DH key agreement. This ensures that only the communicating parties can decrypt the voice stream Signal — Signal Docs (2023).

  2. Can I tell if my SIP call is encrypted? Yes. Open Wireshark, capture on your local interface, and filter sip. Look for the Transport: TLS header in the INVITE message. If it’s missing, the call is unencrypted.

  3. Does a VPN hurt call quality? It can add a small amount of latency, but modern VPN protocols like WireGuard are very fast. In practice, the benefit of hiding your traffic outweighs the minor delay.

  4. How can I detect a sniffing attack in real time? There is no fool-proof alarm, but you can monitor your Wireshark capture for an unusually high number of SIP or RTP packets that are not part of your call. A sudden spike often indicates a local eavesdropper.

  5. Is it safe to use public Wi-Fi for VoIP if I enable TLS and SRTP? It adds layers of protection, but the network still knows you are using VoIP. Adding a VPN is the safest approach. Avoid free, unencrypted Wi-Fi if you can.

  6. What if my VoIP provider doesn’t support TLS? Contact them or look for alternative clients that can force TLS. Some providers allow you to negotiate TLS through SIP extensions.

Conclusion

Keeping your VoIP calls private on public Wi-Fi is not magic— it’s a set of deliberate steps. Enable TLS for signaling, SRTP for media, wrap everything in a VPN, and confirm with Wireshark that the packets are encrypted. Keep your software updated and only use Wi-Fi that mandates encryption. By following these steps, you can enjoy a clear call without fear of a hidden eavesdropper.

Next steps for you:

  1. Open your VoIP client’s network settings and enable TLS/SRTP.
  2. Download and install a reputable VPN client (OpenVPN, WireGuard, etc.).
  3. Run a quick Wireshark test to confirm encryption.
  4. Stay updated and choose secure Wi-Fi.

If you’re a network administrator, enforce TLS and SRTP on all VoIP endpoints and educate users about VPN usage. If you’re a general user, protect yourself with the tools above and enjoy a private conversation.

Glossary

  • VoIP – Voice over Internet Protocol, a technology that sends voice data over IP networks.
  • SIP – Session Initiation Protocol, the signaling protocol used to set up, modify, and tear down VoIP calls.
  • RTP – Real-time Transport Protocol, the protocol that carries the actual voice packets.
  • TLS – Transport Layer Security, an encryption protocol that secures SIP signaling.
  • SRTP – Secure Real-time Transport Protocol, an extension of RTP that encrypts the media stream.
  • Wi-Fi – Wireless Local Area Network, a common name for Wi-Fi access points.
  • VPN – Virtual Private Network, a secure tunnel that hides traffic from local observers.
  • Wireshark – A network protocol analyzer that captures and displays network traffic.
  • Signal – A privacy-focused messaging app that uses end-to-end encryption for voice calls.
  • E2EE – End-to-End Encryption, a method where only the communicating parties can read the data.

References

Last updated: February 26, 2026

Recommended Articles

Secure Browsing Made Simple: Stop SNI, DNS, and DPI Leaks | Brav

Secure Browsing Made Simple: Stop SNI, DNS, and DPI Leaks

Discover practical steps to eliminate SNI, DNS, and DPI leaks in your network. Learn how VPNs, Shadowsocks, and proxy chains protect privacy.
I Built a Raspberry Pi Wi-Fi Packet Capture Device with PoE, Multi-Adapter Support, and a Web UI | Brav

I Built a Raspberry Pi Wi-Fi Packet Capture Device with PoE, Multi-Adapter Support, and a Web UI

Learn how to turn a Raspberry Pi into a headless Wi-Fi packet capture device with PoE, multi-adapter support, a Flask web UI, and VPN access. Step-by-step guide.
How I Mastered ADB Wi-Fi Commands to Control Android From Linux | Brav

How I Mastered ADB Wi-Fi Commands to Control Android From Linux

Use ADB Wi-Fi commands to control Android devices from Linux: enable Wi-Fi, scan networks, join hidden SSIDs, and spin up hotspots—all from terminal.