First I wasn't asking for free, but what do other pro's use when getting a commercial softphone.
I sense you are not an over big fan of the softphone but a lot of those arguments are a little bit weak to say softphone are not valid. Examples: email can send attatchements too, almost any software can access the local and network file system, and what software isn't network-enabled?
Also, where is the link to that trojan phone? (not the wikipedia article) Now I want that thing! ;-)
take care
matt