

Users assume the confidentiality and privacy when they communicate, and they are morally justified to do so. And of course in societies that are not so democratic, this type of information is critical to bring down opposition and stifle human rights.
JITSI ORG MEET PROFESSIONAL
This makes the private and professional lives of citizens an open book to companies that with the help of AI and other technologies make billions from selling 'hidden data' normal people are completely unaware of even exists. if you want to be reachable across the internet, you have to constantly let the communication provider follow you wherever you go.

The more interesting parts are who talks to whom, when, and where they are in the real world while they meet on the internet. It is mostly not about what you say, so it is relatively easy for providers to allow some form of privacy by encrypting messages. Unlike the traditional phone companies, many of the large technology providers run their business not on delivering an honest service but on secretly eavesdropping on their users and selling information to others. Because internet works almost everywhere, the natural privacy protection of the walls of a house, a school or an office is gone. However, users have a hard time to understand how privacy is impacted if they use the wrong technology. Internet communication has become the nerve center of whole neighbourhoods, where people watch over the possessions of their neighbours while these are away for work or leisure. This is so convenient, that some businesses have already moved entirely online. Businesses can easily service their customers where this is most convenient to them, without having to travel themselves. People collaborate with their colleagues from the couch of their living room, the cafe where they enjoy lunch or on their cell phone on the bus to the gym. Internet allows anyone to keep closely connected with friends and family, and help their kids solve a math problem while they are at work. One of the things people enjoy the most about the internet, is that it enables them to talk to others remotely almost without limit. Why does this actually matter to end users? This project will implement and verify a more complete solution that involve a key management system which establishes public keys, derives encryption keys and changes them depending on the state of the conference. With the advent of the WebRTC Insertable Streams API in Chrome it became possible to implement actual end-to-end encryption on top of WebRTC.

The drawback of this is of course that the videobridge is able to view the unencrypted contents. Traditionally, it used hop-by-hop encryption to secure the contents. Jitsi Meet is an open-source video conferencing application that uses Jitsi Videobridge to provide high quality, secure and scalable video conferences.
