- cross-posted to:
- privacy@lemmy.ml
- cross-posted to:
- privacy@lemmy.ml
After this announcement, I am planning to reject meetings organised in zoom. But the problem is that it’s really good. So, is there any privacy friendly and viable alternatives to zoom? It does not have to be open source because I nearly tried all alternatives. Your experiences?
Jitsi is an alternative that works fairly well.
I’ve found Jitsi to be a great replacement. The only shortfall I found is that most folk don’t know about it and can be resistent to trying it.
But it works in a web browser. So you can just send them the link
I tried it on the browser on my own and it seemed to work okay at first glance. I haven’t tried the app due to the 3.8-star rating on Google Play that is actually closer to a 3-star rating when you account for the fact that half of the 5-star ratings look fake. Main complaints seemed to be sound and video quality and getting disconnected. The fact that anybody can just come into your session if they guess the room name correctly isn’t optimal either. Overall it feels janky, or maybe I am spoiled. I could be spoiled.
The fact that anybody can just come into your session if they guess the room name correctly isn’t optimal either.
If you ignore the warnings about an easily-guessable name, ignore the option to use a waiting room, and ignore the suggestions to use a password, yeah.
You can set the session in lobby mode wheresomeone has to be accepted or you can require a password to join. Its not a bad app, or at least the version from fdroid.
Jitsi would be my choice.
Proton Mail uses PGP which depends on which cipher both recipient and sender, sharing PGP keys are also problematic. PGP doesn’t encrypt subject line but Tutanota does. Tutanota uses AES-128 and RSA-2048 for their encryption and uses AES-128 for external encrypted email which Tutanota and Proton Mail also supports.
If you want privacy-friendly, you really do want something that’s open source. Jitsi is probably your best bet.
You beat me to it for recommending Jitsi.
Tutanota first use the user password to generate an AES key using BCrypt, that AES key is then used to encrypt the private key. The encrypted private key and hashed AES key is then sent to the server, hence the server does not store nor know the private key and the hashed AES key is used to authenticate the user. It uses SHA256 for hashing, it’s safe because the hashing algorithm is one way only and not reversible, meaning you can’t convert the hash to the password but only the other way around the password can generate the hash, so even the server is compromised it doesn’t gain access to your password.
Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted for Proton Mail.
I really like Jitsi Meet and use it for any video conference calls. And Signal for one on one calls with friends and family.
For what it is worth, the FSF uses Jitsi Meet too and put up their own instance.
That’s great!