Things to do[edit]
Test if proxy disable and firewall disable software initiate an active trace, if the monitor bypass is running.
Test if proxy bypass and firewall bypass are truly undetectable, without bypassing the monitor.
Test if voice analyser is detected by monitors.