How Does ZRTP Protect VoIP End-Points from Man-in-the-Middle Attacks?

There are a number of routes by