Jitsi meet security5/29/2023 In addition, 8×8 may use this information to investigate fraud or abuse.”ĭoes this mean that the data stated in the quotation is stored “temporarily” with temporarily not being defined further or is it actually either deleted live during the meeting and right after the meeting?Īpparently, one solution could be to host your own meeting server. “8×8 uses this information to deliver the service, to identify and troubleshoot problems with the service, and to improve the service. In some cases, meeting related content, which may contain personal information, is temporarily stored to enable user functionality in a video meeting.” “To provide the service, 8×8 processes network and usage information including IP addresses for the meeting participants, the user specified URL used to host the meeting, and information about the phone numbers that connect to the meeting (if audio connection is made via a telephone call). either stored in something like RAM or immediately deleted? and others, disregarding recordings, such as stats deleted after the meeting.īut, at the same time on another website Privacy Policy | Privacy Supplement it seems that what jitsi meet collects and stores is in some regard determined by its hosting company 8x8. It says on that website that some parts are only live in memory i.e. The rooms themselves might be destroyed once the meeting is over, but it seems less clear if all the data and metadata connected to it is destroyed as well.Instead Jitsi meet seems to use some kind of encryption, DTLS-SRTP, which however is only active when transferring data from participants to the Jitsi server, effectively offering transport encryption?.Jitsi meet provides e2ee but it might be useless as the instance encrypting it is the same instance that transmits it.To answer my own questions then it seems that Thanks, that already provided some information. If anyone has any recommendations here on how to do that or stuff I could read up on, that would be appreciated. Generally, given that I do not know much about all this, I’d like to know how to make chats and calls more secure. in any of the Five Eyes Countries? Does it support anything fancy like routing it through multiple nodes like Tor and the likes? would anyone with access to the jitsi servers have my and the other participant’s IP address and the connection time? Where are jitsi servers located, e.g. What about other things that might be important? Does jitsi meet support things like Perfect Forward Secrecy? What data or metadata are stored and for how long on any server, i.e. Unfortunately, I don’t know much about the current level of security technology, but I’d want an app that is secure in the way that my chat and calls are not accessible to anyone except for myself and the people I talk to.įrom what I have heard end-to-end-encryption is one of the things which seem to be recommended for this because, as far as I have understood it, the transmitted data is encrypted in such a way that it is close to impossible for anyone but the sender and receiver to decrypt it with the current state of technology. I am looking for a secure, anonymous and private video and chat app and was recommended jitsi meet.
0 Comments
Leave a Reply. |