<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class="">You’re correct. For p2p calls it is end to end. For non-p2p calls, the bridge decrypts from each sender in memory and re-encrypts to each receiver.<div class=""><br class=""></div><div class="">The idea is to expand this to allow packets to also be encrypted on each client so the bridge would have no access to the content even for non-p2p calls.</div><div class=""><br class=""></div><div class="">-Aaron<br class=""><div><br class=""><blockquote type="cite" class=""><div class="">On Apr 4, 2020, at 12:22 PM, Federico Guerrini <<a href="mailto:federico.guerrini@hushmail.com" class="">federico.guerrini@hushmail.com</a>> wrote:</div><br class="Apple-interchange-newline"><div class=""><span style="caret-color: rgb(0, 0, 0); font-style: normal; font-variant-caps: normal; font-weight: normal; letter-spacing: normal; text-align: start; text-indent: 0px; text-transform: none; white-space: normal; word-spacing: 0px; -webkit-text-stroke-width: 0px; text-decoration: none; font-family: Arial; font-size: 14px; line-height: 21px;" class=""><div class="">Hello Aaron,<span class="Apple-converted-space"> </span><br class=""></div><div class=""><br class=""></div><div class="">Forgive my ignorance, but I'm a bit confused, I thought Jitsi already had end-to-end, at least for P2P calls?</div><div class=""><p class=""><span style="font-weight: 400;" class="">"Jitsi meetings can operate in 2 ways: peer-to-peer (P2P) or via the Jitsi Videobridge (JVB). This is transparent to the user. P2P mode is only used for 1-to-1 meetings. In this case, audio and video are encrypted all the way from the sender to the receiver, even if they traverse network components like TURN servers."</span></p><p class=""><span style="font-weight: 400;" class=""><a href="https://jitsi.org/news/security/" class="">https://jitsi.org/news/security/</a></span></p><p class=""><span style="font-weight: 400;" class="">Did I get it wrong?<br class=""></span></p><p class=""><span style="font-weight: 400;" class="">Kind regards,<br class=""><br class="">Federico</span></p><p class=""><span style="font-weight: 400;" class=""><br class=""></span></p><p class=""><span style="font-weight: 400;" class=""><br class=""></span></p></div><br class="">On 3/4/2020 at 10:03 PM, "Aaron van Meerten" <<a href="mailto:aaron.van.meerten@gmail.com" class="">aaron.van.meerten@gmail.com</a>> wrote:<blockquote style="border-left-width: 1px; border-left-style: solid; border-left-color: rgb(204, 204, 204); margin-left: 10px; padding-left: 10px;" class=""><div class=""><div class="">We on the Jitsi team are working on such features. Check out <a class="" target="_blank" href="https://jitsi/">https://jitsi</a>.org/ or our flagship deployment <a href="https://meet.jit.si/" target="_blank" class="">https://meet.jit.si/</a><br class=""><br class="">We hope to be layering on end-to-end encryption features, and would happily take community contributions.<br class=""><br class="">Cheers,<br class=""><br class="">-Aaron<br class=""><br class=""><blockquote class="">On Apr 3, 2020, at 2:56 PM, Yosem Companys <<a href="mailto:ycompanys@gmail.com" class="">ycompanys@gmail.com</a>> wrote:<br class=""><br class="">Hey all,<br class=""><br class="">Read the Intercept article in the link below. <br class=""><br class="">Seems like we need a truly encrypted and open-source Zoom alternative. <br class=""><br class="">Anyone interested in developing one? Email me privately.<br class=""><br class="">And please share with your million closest friends.<br class=""><br class="">Thank you,<br class="">Yosem<br class=""><br class=""><a href="https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/" target="_blank" class="">https://theintercept.com/2020/04/03/zooms-encryption-is-not-suited-for-secrets-and-has-surprising-links-to-china-researchers-discover/</a><br class=""><br class=""><img class="" src="x-msg://166/1.1.6/shared/images/blank_image.gif" width="0" height="0" align="left" style="border: 0px; width: 0px; height: 0px;"><br class="">-- <br class="">Liberationtech is public & archives are searchable from any major commercial search engine. Violations of list guidelines will get you moderated: <a href="https://lists.ghserv.net/mailman/listinfo/lt" target="_blank" class="">https://lists.ghserv.net/mailman/listinfo/lt</a>. Unsubscribe, change to digest mode, or change password by emailing <a href="mailto:lt-owner@lists.liberationtech.org" class="">lt-owner@lists.liberationtech.org</a>.<br class=""></blockquote><br class=""></div></div></blockquote><br class=""><br class="">--<span class="Apple-converted-space"> </span><br class=""><a href="http://www.forbes.com/sites/federicoguerrini/" class="">http://www.forbes.com/sites/federicoguerrini/</a><br class=""><br class=""><a href="http://reutersinstitute.politics.ox.ac.uk/publication/newsroom-curators-and-independent-storytellers" class="">http://reutersinstitute.politics.ox.ac.uk/publication/newsroom-curators-and-independent-storytellers</a><br class=""><br class=""><a href="http://www.federicoguerrini.com/" class="">www.federicoguerrini.com</a><br class=""><br class="">My latest book: Content Curation (Italian)<br class=""><br class=""><a href="http://www.amazon.it/Content-Curation-Federico-Guerrini/dp/8820366126" class="">http://www.amazon.it/Content-Curation-Federico-Guerrini/dp/8820366126</a></span></div></blockquote></div><br class=""></div></body></html>