Linux Format

Security protocols

How can you be sure that your communicat­ions are safe and private?

-

Jitsi supports the Off-The-Record (OTR) protocol to encrypt IM conversati­ons. OTR uses 128-bit AES, along with a couple of other hash functions, to provide authentica­tion and forward secrecy along with encryption. Jitsi also uses the ZRTP protocol to negotiate keys when it’s establishi­ng a connection via the RTP protocol to exchange audio and video.

GNURing offers end-to-end encryption along with TSL/SSL support for secure connection­s between users. It’s the only tool on our list to offer a completely distribute­d IM solution, but the feature comes with its own set of pros and cons.

By default, OpenMeetin­gs uses HTTP protocol to connect the client to the server. It similarly uses RTMP protocol to transfer audio/video as well as user login credential­s. The website provides instructio­ns on how to use the HTTPS and RTMPS protocols instead.

The uTox client is based on the Tox protocol. It uses the NaCl crypto library to enforce end-to-end encryption with perfect forward secrecy. The protocol essentiall­y generates a temporary public/private key pair which is used to make connection­s to non-friend peers. Tox clients additional­ly use Onion routing to store and locate Tox Ids. This last step makes it practicall­y impossible to associate users to each other.

 ??  ?? Jitsi takes a keen interest in protecting all your conversati­ons.
Jitsi takes a keen interest in protecting all your conversati­ons.
 ??  ??

Newspapers in English

Newspapers from Australia