• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
webrtcHacks

webrtcHacks

guides and information for WebRTC developers

  • Home
  • Livestream
  • About
    • Chad Hart
    • Philipp Hancke
  • Subscribe
  • Merch
  • Contact
  • Show Search
Hide Search

Blackbox Exploration

Reverse-Engineering Blackbox Exploration, chatgpt, openai, realtime api with webrtc

How OpenAI does WebRTC in the new gpt-realtime

Earlier this month, OpenAI released the GA version of its realtime API. This includes many capabilities that the Beta didn’t have, including video support. I started out doing an update to the The Unofficial Guide to OpenAI’s Realtime WebRTC API I made for the Beta release last November. I discovered there were enough WebRTC updates […]

Chad Hart · September 23, 2025

Guide Reverse-Engineering Blackbox Exploration, openai, realtime api with webrtc

Measuring the response latency of OpenAIs WebRTC-based Realtime API

As Chad mentioned in his post last week, we have been diving into what OpenAI is doing with WebRTC. Over the last months, we actually did a full teardown and compared OpenAI’s Realtime API to what powers chatgpt.com. What intrigued us most was how to measure response latency. One of the key metrics for any […]

Philipp Hancke · April 1, 2025

Reverse-Engineering Review Blackbox Exploration, cloudflare, WHEP, WHIP

How Cloudflare Glares at WebRTC with WHIP and WHEP

WebRTC blackbox reverse engineering experts Gustavo and Fippo take a look at Cloudflare’s new WebRTC implementation, how Cloudflare uses the new WebRTC-based streaming standards WHIP and WHEP, and the bold pronouncement that they can be a replacement to open source solutions.

Gustavo Garcia · October 25, 2022

Reverse-Engineering Blackbox Exploration, Duo, e2ee, google, Google Meet, Opus, ssltcp, VP9, webrtc-internals

Meet vs. Duo – 2 faces of Google’s WebRTC

A very detailed look at the WebRTC implementations of Google Meet and Google Duo and how they compare using webrtc-internals and some reverse engineering.

Gustavo Garcia · June 15, 2022

Reverse-Engineering Technology apple, Blackbox Exploration, ip leakage, Safari

Apple’s not so private relay fails with WebRTC

Apple released iOS 15 with iCloud Private Relay broken for WebRTC – it still divulges your IP address. This post walks through why and how the WebRTC API’s use your IP address information and how you can check what IP addresses are gathered.

Philipp Hancke · September 27, 2021

Primary Sidebar

  • Sponsored. Become a webtcHacks sponsor

Email Subscription

Subscribe to our mailing list

* indicates required
webrtcHacksguides and information for WebRTC developers

Footer

SITE

  • Post List
  • About
  • Contact

Categories

  • Guide
  • Other
  • Reverse-Engineering
  • Review
  • Standards
  • Technology
  • Uncategorized

Tags

apple Blackbox Exploration Brief Chrome code computer vision DataChannel debug e2ee Edge gateway getUserMedia Google Meet ICE ims insertable streams ios ip leakage janus jitsi MCU MoQ NAT Opus ORTC Promo Q&A quic raspberry pi Safari SDP sfu simulcast standards TURN video vp8 w3c Walkthrough Web Audio webcodecs webrtc-internals webtransport WHIP wireshark

Follow

  • Twitter
  • YouTube
  • GitHub
  • RSS

webrtcHacks · copyright © 2026