Completed
WebRTC weaknesses
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Agenda
- 3 What is WebRTC
- 4 Peertopeer browser communication
- 5 WebRTC architecture
- 6 Communication protocols
- 7 Session description protocol
- 8 Networking
- 9 Identity provisioning
- 10 Questions
- 11 General Observations
- 12 WebRTC Permission Model
- 13 Do you want to be involved
- 14 Two packs of privacy
- 15 What happens if you eavesdrop
- 16 Network attacker
- 17 DTLS
- 18 Maninthemiddle
- 19 Clone video
- 20 Endpoint authenticity
- 21 Identity provider
- 22 Fingerprinting
- 23 IP addresses
- 24 WebRTC weaknesses
- 25 Identity providers
- 26 Automatic identities assertions
- 27 Automatic identities assertion attack
- 28 Wrapup
- 29 Security consequences
- 30 Web permission model
- 31 Webpart authentication
- 32 New browser capabilities
- 33 Resources
- 34 WebRTC Magazine
- 35 Clientside Web Security Handbook
- 36 Any questions