- Dear NY Times, if you’re going to hack people, at least do it cleanly! 37,085 views
- Build your own phone company with WebRTC and a weekend 29,539 views
- How does Hangouts use WebRTC? webrtc-internals analysis 21,202 views
- How to Figure Out WebRTC Camera Resolutions 21,048 views
- WebRTC Developer Tool Vendor Directory 20,556 views
- Anatomy of a WebRTC SDP 15,876 views
- What’s up with WhatsApp and WebRTC? 15,670 views
webrtcH4cKS: ~ Traffic Encryption
So I talked about Skype and Viber at KrankyGeek two weeks ago. Watch the video on youtube or take a look at the slides. No “reports” or packet dumps to publish this time, mostly because it is very hard to draw conclusions from the results.
The VoIP services we have looked at so far which use the RTP protocol for transferring media. RTP uses a packet header which is not encrypted and contains a number of attributes such as the payload type (identifying the codec used), a synchronization source (which identifies the source of the stream), a sequence number and a timestamp. This allows routers to identify RTP packets and prioritize them. This also allows someone monitoring all network traffic (“Pervasive Monitoring“) to easily identify VoIP traffic. Or someone wiretapping your internet connection.