Best Open Source Voice/Video Chat Tools
(Technology has come so far, we can transmit video)
♦️Jitsi
~~ https://jitsi.org
♦️Linphone
~~ https://www.linphone.org
♦️Nextcloud Talk
~~ https://nextcloud.com/talk
♦️Jami
~~ https://jami.net
♦️Wire
~~ https://wire.com
♦️Matrix
~~ https://matrix.org
♦️Signal
~~ https://signal.org
♦️BigBlueButton
~~ https://docs.nixnet.services/BigBlueButton
📡 @NoGoolag 📡 @Libreware
#chat #video #videocall #alternatives #foss #not #skype
(Technology has come so far, we can transmit video)
♦️Jitsi
~~ https://jitsi.org
♦️Linphone
~~ https://www.linphone.org
♦️Nextcloud Talk
~~ https://nextcloud.com/talk
♦️Jami
~~ https://jami.net
♦️Wire
~~ https://wire.com
♦️Matrix
~~ https://matrix.org
♦️Signal
~~ https://signal.org
~~ https://docs.nixnet.services/BigBlueButton
📡 @NoGoolag 📡 @Libreware
#chat #video #videocall #alternatives #foss #not #skype
Jitsi
Free Video Conferencing Software for Web & Mobile | Jitsi
Learn more about Jitsi, a free open-source video conferencing software for web & mobile. Make a call, launch on your own servers, integrate into your app, and more.
Jitsi Meet - Free and open source online video chat
- Great alternative to Zoom, Skype, Hangouts etc.
- No account required, just a URL and a code
- Encrypted by default
- Free and open source
- Simple and easy to use
- Private, unlike Zoom, https://blogs.harvard.edu/doc/2020/03/27/zoom/
- Great video and audio quality (normally better then alternatives like Hangouts or Zoom)
Website here - https://meet.jit.si/
More privacy-respecting alternatives: https://t.me/NoGoolag/2348
📡@NoGoolag
#videochat #conferencing #opensource #zoom #skype
- Great alternative to Zoom, Skype, Hangouts etc.
- No account required, just a URL and a code
- Encrypted by default
- Free and open source
- Simple and easy to use
- Private, unlike Zoom, https://blogs.harvard.edu/doc/2020/03/27/zoom/
- Great video and audio quality (normally better then alternatives like Hangouts or Zoom)
Website here - https://meet.jit.si/
More privacy-respecting alternatives: https://t.me/NoGoolag/2348
📡@NoGoolag
#videochat #conferencing #opensource #zoom #skype
Doc Searls Weblog
Zoom needs to clean up its privacy act
[21 April 2020—Hundreds of people are arriving here from this tweet, which calls me a “Harvard researcher” and suggests that this post and the three that follow are about “the ful…
Forwarded from BlackBox (Security) Archiv
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@NoGoolag
📡@BlackBox
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five top instant messaging apps for iOS in the context of their forensic analysis.
Acquisition and Extraction
Speaking of iOS, there are several methods to acquiring communications going through an instant messaging app. The MITM (man-in-the-middle) attack is practically out of the question for most modern instant messaging apps; if there are exceptions, we aren’t aware of those. Even on Android devices, a MITM attack would require installing a third-party SSL certificate, and even that may not work for some instant messengers.
The ability to obtain communication histories from the vendor is a great tool in the hands of the law enforcement. The policies of different vendors vary greatly from near-instant full disclosure to flat non-disclosure with stops in between. We’ll discuss it in detail for each of the messaging apps.
Cloud extraction may be possible from several sources, which include iCloud synchronized data (including end-to-end encrypted data), iCloud backups and stand-alone backups in iCloud Drive. It’s up to the vendor to decide where and how to store the data; more on that later.
Finally, the data can be extracted from the iPhone device itself. For some messaging apps, logical extraction via iTunes-style backups is enough, while some other messengers don’t store anything in local backups. Imaging the file system (and, in some cases, decrypting the keychain) is always enough to gain full access to conversation histories.
So let us see the different extraction options available for the five top instant messaging apps for iOS.
https://blog.elcomsoft.com/2020/04/forensic-guide-to-imessage-whatsapp-telegram-signal-and-skype-data-acquisition/
#forensic #guide #imessage #whatsapp #telegram #signal #skype
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@NoGoolag
📡@BlackBox
ElcomSoft blog
Forensic guide to iMessage, WhatsApp, Telegram, Signal and Skype data acquisition
Instant messaging apps have become the de-facto standard of real-time, text-based communications. The acquisition of instant messaging chats and communication histories can be extremely important for an investigation. In this article, we compare the five…