| http://www.w3.org/ns/prov#value | - Their full article can be found here but the summary is that they have used a phone to Ethernet adaptor (like the one @Rich Homolka mentions in his answer) wired in to the Pi and a couple of scripts to make sure that the caller is a person or appears on a whitelist before the actual phone is allowed to ring.
|