|
@@ -45,7 +45,8 @@ see our [guidelines for contributing](CONTRIBUTING.md).
|
45
|
45
|
Jitsi Meet provides a very flexible way of embedding in external applications by using the [Jitsi Meet API](doc/api.md).
|
46
|
46
|
|
47
|
47
|
## Security
|
48
|
|
-WebRTC does not provide a way of conducting multi-party conversations with end-to-end encryption.
|
|
48
|
+
|
|
49
|
+WebRTC does not (yet) provide a way of conducting multi-party conversations with end-to-end encryption.
|
49
|
50
|
Unless you consistently compare DTLS fingerprints with your peers vocally, the same goes for one-to-one calls.
|
50
|
51
|
As a result, your stream is encrypted on the network but decrypted on the machine that hosts the bridge when using Jitsi Meet.
|
51
|
52
|
|
|
@@ -57,6 +58,14 @@ Jitsi Meet in terms of security.
|
57
|
58
|
The [meet.jit.si](https://meet.jit.si) service is maintained by the Jitsi team
|
58
|
59
|
at [8x8](https://8x8.com).
|
59
|
60
|
|
|
61
|
+## Security issues
|
|
62
|
+
|
|
63
|
+We take security very seriously and develop all Jitsi projects to be secure and safe.
|
|
64
|
+
|
|
65
|
+If you find (or simply suspect) a security issue in any of the Jitsi projects, please send us an email to security@jitsi.org.
|
|
66
|
+
|
|
67
|
+**We encourage responsible disclosure for the sake of our users, so please reach out before posting in a public space.**
|
|
68
|
+
|
60
|
69
|
## Acknowledgements
|
61
|
70
|
|
62
|
71
|
Jitsi Meet started out as a sample conferencing application using Jitsi Videobridge. It was originally developed by ESTOS' developer Philipp Hancke who then contributed it to the community where development continues with joint forces!
|