- Dear NY Times, if you’re going to hack people, at least do it cleanly! 37,016 views
- Build your own phone company with WebRTC and a weekend 29,269 views
- How does Hangouts use WebRTC? webrtc-internals analysis 21,093 views
- How to Figure Out WebRTC Camera Resolutions 20,892 views
- WebRTC Developer Tool Vendor Directory 20,443 views
- Anatomy of a WebRTC SDP 15,754 views
- What’s up with WhatsApp and WebRTC? 15,591 views
webrtcH4cKS: ~ Traffic Encryption
So I talked about Skype and Viber at KrankyGeek two weeks ago. Watch the video on youtube or take a look at the slides. No “reports” or packet dumps to publish this time, mostly because it is very hard to draw conclusions from the results.
The VoIP services we have looked at so far which use the RTP protocol for transferring media. RTP uses a packet header which is not encrypted and contains a number of attributes such as the payload type (identifying the codec used), a synchronization source (which identifies the source of the stream), a sequence number and a timestamp. This allows routers to identify RTP packets and prioritize them. This also allows someone monitoring all network traffic (“Pervasive Monitoring“) to easily identify VoIP traffic. Or someone wiretapping your internet connection.