WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?

WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?

Devoxx via YouTube Direct link

Introduction

1 of 36

1 of 36

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 What is WebRTC
  4. 4 Peertopeer browser communication
  5. 5 WebRTC architecture
  6. 6 Communication protocols
  7. 7 Session description protocol
  8. 8 Networking
  9. 9 Identity provisioning
  10. 10 Questions
  11. 11 General Observations
  12. 12 WebRTC Permission Model
  13. 13 Do you want to be involved
  14. 14 Two packs of privacy
  15. 15 What happens if you eavesdrop
  16. 16 Network attacker
  17. 17 DTLS
  18. 18 Maninthemiddle
  19. 19 Clone video
  20. 20 Endpoint authenticity
  21. 21 Identity provider
  22. 22 Fingerprinting
  23. 23 IP addresses
  24. 24 WebRTC weaknesses
  25. 25 Identity providers
  26. 26 Automatic identities assertions
  27. 27 Automatic identities assertion attack
  28. 28 Wrapup
  29. 29 Security consequences
  30. 30 Web permission model
  31. 31 Webpart authentication
  32. 32 New browser capabilities
  33. 33 Resources
  34. 34 WebRTC Magazine
  35. 35 Clientside Web Security Handbook
  36. 36 Any questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.