I am also interested in the OBiTalk protocol, although I believe it is proprietary and unpublished. (And, unfortunately, the term "OBiTalk" is unclear in that it refers to both the
obitalk.com configuration interface with the device as well as the protocol for making device-to-device voice calls.) In any event, although the common channel signaling (call set-up protocol) is likely encrypted, and the configuration interface almost definitely so, it is not clear to me that the voice channel itself is encrypted. Encryption of voice UDP packets comes at the expense of additional latency, so it is definitely not something that is to be had for free.
But, to revisit your original question for a moment: If you have a server on your local LAN that you can access via ssh from the outside world, you can use ssh to set up a secure remote virtual port to your OBi. From a Linux box, you would type something like:
ssh -p xxx -L 8080:192.168.1.200:80 userid@your_home_IP_address
where the 'xxx' and the last argument are replaced by whatever is appropriate for the hole you've punched in your firewall for this purpose. The "8080:192.168.1.200:80" (where 192.168.1.200 is the IP address assigned to your OBi on your local LAN) equates to telling the ssh client "once you've established a connection to the far end, create a local port 8080 which is forwarded (via the encrypted channel) to IP 192.168.1.200 port 80 on the other side of the connection". You can then simply launch a browser on the device you are using and point it to "localhost:8080" to access your OBi device remotely. I believe this works with Putty under Windows as well, although it's been quite a while since I've played with either Putty or Windows.
Hope this helps.