• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
webrtcHacks

webrtcHacks

guides and information for WebRTC developers

  • Home
  • Livestream
  • About
    • Chad Hart
    • Philipp Hancke
  • Subscribe
  • Merch
  • Contact
  • Show Search
Hide Search

e2ee

retrained man standing in a water tank sitting on a stage in front of an audience

Reverse-Engineering Standards e2ee, Google Meet, insertable streams

End-to-End Encryption in WebRTC… 4 Years Later

We covered End-to-end encryption (E2EE) before, first back in 2020 when Zoom’s claims to do E2EE were demystified (not just by us; they later got fined $85m for this), followed by the quite exciting beta implementation of E2EE in Jitsi using Chromium’s Insertable Streams API. A bit later we had Matrix explain how their approach […]

Philipp Hancke · March 12, 2024

Reverse-Engineering Blackbox Exploration, Duo, e2ee, google, Google Meet, Opus, ssltcp, VP9, webrtc-internals

Meet vs. Duo – 2 faces of Google’s WebRTC

A very detailed look at the WebRTC implementations of Google Meet and Google Duo and how they compare using webrtc-internals and some reverse engineering.

Gustavo Garcia · June 15, 2022

Technology e2ee, Element, encryption, Matrix.org, olm

How does WebRTC End-to-End Encryption work? Matrix.org example (Dave Baker)

One of WebRTC’s great features is its mandated strong encryption.  Encryption mechanisms are built-in, meaning developers don’t (often) need to deal with the details. However, these easy, built-in encryption mechanisms assume you have: 1) media is communicated peer-to-peer and 2) a secure signaling channel setup. Most group-calling services make use of a media server device, […]

Dave Baker · October 5, 2021

Reverse-Engineering apple, Blackbox Exploration, e2ee, FaceTime, ios, wireshark

FaceTime finally faces WebRTC – implementation deep dive

Deep dive analysis on how FaceTime for Web uses WebRTC. Philipp “Fippo” Hancke uses webrtc-internals, Wireshark, and reviews the JavaScript implementation to expose Apple’s implementation details.

Philipp Hancke · June 14, 2021

Guide e2ee, insertable streams, jitsi, webrtc-nv

True End-to-End Encryption with WebRTC Insertable Streams

A couple of weeks ago, the Chrome team announced an interesting Intent to Experiment on the blink-dev list about an API to do some custom processing on top of WebRTC. The intent comes with an explainer document written by Harald Alvestrand which shows the basic API usage. As I mentioned in my last post, this is the […]

Philipp Hancke · April 12, 2020

Primary Sidebar

  • Sponsored. Become a webtcHacks sponsor

Email Subscription

Subscribe to our mailing list

* indicates required
webrtcHacksguides and information for WebRTC developers

Footer

SITE

  • Post List
  • About
  • Contact

Categories

  • Guide
  • Other
  • Reverse-Engineering
  • Review
  • Standards
  • Technology
  • Uncategorized

Tags

apple Blackbox Exploration Brief Chrome code computer vision DataChannel debug e2ee Edge gateway getUserMedia Google Meet ICE ims insertable streams ios ip leakage janus jitsi MCU MoQ NAT Opus ORTC Promo Q&A quic raspberry pi Safari SDP sfu simulcast standards TURN video vp8 w3c Walkthrough Web Audio webcodecs webrtc-internals webtransport WHIP wireshark

Follow

  • Twitter
  • YouTube
  • GitHub
  • RSS

webrtcHacks · copyright © 2026