David Woolley spake unto us the following wisdom:
> [email protected] wrote:
> >I read at wikipedia about ZRTP (https://en.wikipedia.org/wiki/ZRTP)
> 
> It seems to be encryption without authentication, which means it is
> vulnerable to man in the middle attacks.

Authentication can be handled by the signalling protocol that sets up
the RTP stream.

Ethan

_______________________________________________
[email protected] mailing list
Want to unsubscribe?  Use this link:
http://pidgin.im/cgi-bin/mailman/listinfo/support

Reply via email to