Feeds

Skype to start charging for iPhone VoIP

Over 3G, on the iPhone

3 Big data security analytics techniques

Skype has launched a new iPhone version, enabling calls over the 3G data network, but come 2011 users will be expected to start paying for those calls too.

Skype-to-Skype calls over Wi-Fi will remain free, along with Skype over the fixed internet, but if you're expecting free VoIP over your 3G connection (without a premium charge) then you'll have to think again (or just download a copy of Fring or similar).

Skype's pricing remains to be seen: Skype hasn't responded to our request for more information and the details won't emerge until the end of the year, but a monthly subscription split with the network operator seems the most likely model for the application that Steve Jobs himself said wouldn't be welcome on the iPhone.

Voice is still the cash cow for the operators, by a considerable margin. Data traffic might clog up their networks, but voice is what pays for everything and mobile VoIP threatens that revenue. So as long as Apple was beholden to the operators such applications remained verboten on the iPhone at least.

Since earlier this year Fring has provided an iPhone application enabling free VoIP calls over the 3G network, now enhanced to enable video too. Fring reckons it can make the system pay through embedded advertising, but Skype is looking for a more direct revenue stream for its 3G service.

Given the free alternatives it's hard to imagine many people will sign up to pay for Skype, but one shouldn't underestimate the power of the Skype brand.

In the UK 3 already offers free Skype calling in some of its tariffs* which has proved very popular, so Skype is no doubt now talking to the rest of the mobile operators about arranging similar deals with a revenue share - though now it has a deadline by which any such arrangement must be fixed.

Interestingly 3's service is not entirely VoIP: the mobile part is routed over the normal voice network, but thanks to clever handset integration that makes no difference to the user. ®

* interestingly 3's service is not entirely VoIP: the mobile part is routed over the normal voice network, but thanks to clever handset integration that makes no difference to the user

Top three mobile application threats

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
Google looks to LTE and Wi-Fi to help it lube YouTube tubes
Bandwidth hogger needs tube embiggenment if it's to succeed
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.