http://torfone.org/
"As a result, the TORFone was designed to communicate voice via Internet (make phone calls to the addressee) similarly to Skype but with the following differences:
1. TORFone is an open source project, therefore it indicates no "backdoors" and allows quick fixing of potential vulnerabilities.
2. TORFone is fully portable (it can be run from a flash carrier or virtual TrueCrypt-disk and leaves no residue in the system) and works with all versions of Win32 from Windows 98, has very low system requirements (above PI 233 MHz 32M RAM). It saves bandwidth (required from only 2 kbit/s each side using low-bitrates codecs)
3. TORFone is decentralized, i.e. it does not use an external server and does not require pre-registration number.
4. TORFone provides full confidentiality (by using DH-4096 to match the session key, AES-256-OCB to encrypt the voice traffic and PKDF2+HMAC for autentification). The attacker who mirrors the traffic is unable to listen to the conversation and is not able to decode it later even if he gains access to the computers of participants.
5. Caller and callee are completely anonymous to each other and to outside observers (a call is made on Tor hidden service user).
6. Calls using TORFone are hidden to the outside observer because the TORFone can use the Tor network as a transport layer. Since Tor can simulate usual HTTPS-connections using Tor bridges, the same level of indistinguishability may be provied also for TORFone traffic. If TORFone is used without anonymity by making direct connection thorugh Internet, it still may be resistant against some type of DPI because TORFone uses its own protocol (not RTP/ZRTP), which can work over both TCP and UDP connection."
http://torfone.org/download/torfone_V11b.zip
http://torfone.org/download/testing2.pdf
http://torfone.org/download/torchat_010613.zip
http://torfone.org/download/torfone_V11b_src.zip