How does EchoLink handle security?
Each new user of EchoLink must be validated, which means providing positive proof of identity and license, before being granted access. See the Validation FAQ for details. After having been validated, each EchoLink user must provide a password, along with his or her callsign, to log in. Each time a connection is made for a QSO, the EchoLink servers verify both the sender and the receiver before communication can begin. In addition, if you wish, you can configure EchoLink to accept connections only from certain types of stations: repeaters, links, users, or all three. You can also set up a list of any number of “banned” callsigns, which will not be allowed access. In addition, you can block or accept connections according to their international callsign prefix, in order to comply with your country’s rules regarding reciprocal control-operator privileges or third-party traffic restrictions. In Sysop mode, by default, EchoLink announces each station by callsign when the station connects.