David Woolley spake unto us the following wisdom: > [email protected] wrote: > >I read at wikipedia about ZRTP (https://en.wikipedia.org/wiki/ZRTP) > > It seems to be encryption without authentication, which means it is > vulnerable to man in the middle attacks.
Authentication can be handled by the signalling protocol that sets up the RTP stream. Ethan _______________________________________________ [email protected] mailing list Want to unsubscribe? Use this link: http://pidgin.im/cgi-bin/mailman/listinfo/support
