WebRTC per videoconferenze Giacomo Lanzi

WebRTC vs. proprietary software

When it comes to the topic of video conferencing, the solutions available on the market are divided into two main categories: those that require the installation of a specific proprietary software and those that use the WebRTC standard instead. This type of web service has nothing to envy to proprietary software, such as Skype, but offers the undeniable advantage of being able to use a browser as the only requirement.

WebRTC: what it is and how it works

WebRTC (Web Real Time Communications) is a communication standard with native support for the live streaming of audio and video content from the browser without the need for additional plug-ins or the installation of external components. With this standard, you can turn your browser into a video conferencing endpoint.

By not requiring any installation, it is possible to exploit this communication method even on relatively old machines or with limited computing power. Furthermore, it is usually possible to use it even on company laptops that do not allow workers to install any software.

The communication is managed by the service servers and the audio and video quality optimized in real time. In the security field, communications are all protected and encrypted. The interface is based on HTML5 and therefore the only requirement is a browser that supports it. Only excluded is therefore Internet Explorer, which has been replaced by Microsoft Edge.

Advantages

The quality of communication in a WebRTC service is delegated to video and audio codecs. This guarantees excellent performance regardless of the audio / video hardware you have. However, this is only part of what WebRTC-based web services can offer.

Cloud Web Conference offered by SOD also provides other useful tools such as the shared whiteboard, group chat, the possibility of creating separate “rooms” for the participants, up to the possibility of using presentations and sharing the screen among the participants.

All this, without the need to install any program on your computer, minimizing the impact on the operating system and hard disk.

Therefore, the advantages for companies include an interesting reduction in the costs of communication services to support their employees or customers. Communication is definitively independent from the device and an infinite frontier of integration with other services is opened, from email clients to advanced collaboration platforms.

Disadvantages

If there is a fault to be found in WebRTC systems, it is the dependence on the speed of the available network.

In fact, if it is true that the hardware resources are minimal (the possibility of using a browser), the network resources required can still be limiting. Unfortunately in Italy there are still geographic areas where the connection is particularly slow and this could influence the quality of video calls also through a WebRTC service.

For most users, however, it is a very minimal risk. In addition, it is a problem that is also encountered with the use of proprietary software for video calls.

Uses of WebRTC services

Video conferencing or video calling services have become of fundamental importance in this historical period. The need to communicate remotely has become concrete. Being unable to meet live has magnified this need.

Using services based on the WebRTC communication standard has quickly become the preferred solution. Companies that have adopted this standard to move their meetings over the network have not had to worry about installing any software. Even students and teachers were able to finish the 2019/2020 school cycle without worrying too much about the computers available to them.

WebRTC-based video conferencing services have proven to have few obstacles to communication, facilitating many aspects in the working and educational world.

Multiplatform

The absence of an installation brings with it an additional advantage: independence from any operating system or device.

WebRTC services are available wherever it is possible to use a browser, therefore also on mobile devices. In fact, you are further free to communicate with anyone, in any situation and from anywhere. The interface of the Cloud Web Conference service is designed first of all for portable devices, guaranteeing a clear and simple experience in every situation.

Conclusions

WebRTC technology, widely supported by practically every browser in circulation, offers countless advantages to its users and more and more services rely on this standard to offer their videoconferencing solution.

It is to be expected that this will become the standard in a short time, supplanting the proprietary software also in the communication field. It has already happened with data storage and cloud servers, it is only a matter of time.

The advice is therefore to evaluate services such as SOD Cloud Web Conference for your video calls.

[btnsx id=”2931″]

Useful links:

Cloud Conference

Videoconferencing platform

Communications: Webinar and video calls

Share


RSS

More Articles…

Categories …

Tags

RSS Unknown Feed

RSS Full Disclosure

  • MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client February 21, 2025
    Posted by Qualys Security Advisory via Fulldisclosure on Feb 20Qualys Security Advisory CVE-2025-26465: MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client CVE-2025-26466: DoS attack against OpenSSH's client and server ======================================================================== Contents ======================================================================== Summary Background Experiments Results MitM attack against OpenSSH's VerifyHostKeyDNS-enabled client DoS...
  • Self Stored XSS - acp2sev7.2.2 February 21, 2025
    Posted by Andrey Stoykov on Feb 20# Exploit Title: Self Stored XSS - acp2sev7.2.2 # Date: 02/2025 # Exploit Author: Andrey Stoykov # Version: 7.2.2 # Tested on: Ubuntu 22.04 # Blog: https://msecureltd.blogspot.com/2025/02/friday-fun-pentest-series-19-self.html Self Stored XSS #1: Steps to Reproduce: 1. Visit "http://192.168.58.168/acp2se/mul/muladmin.php" and login with "admin" / "adminpass" 2. In the field "Put the […]
  • Python's official documentation contains textbook example of insecure code (XSS) February 21, 2025
    Posted by Georgi Guninski on Feb 20Python's official documentation contains textbook example of insecure code (XSS) Date: 2025-02-18 Author: Georgi Guninski === form = cgi.FieldStorage() if "name" not in form or "addr" not in form: print("Error") print("Please fill in the name and addr fields.") return print("name:", form["name"].value) print("addr:",...
  • Re: Netgear Router Administrative Web Interface Lacks Transport Encryption By Default February 18, 2025
    Posted by Gynvael Coldwind on Feb 17Hi, This isn't really a problem a vendor can solve in firmware (apart from offering configuration via cloud, which has its own issues). Even if they would enable TLS/SSL by default, it would just give one a false sense of security, since: - the certificates would be invalid (public […]
  • Monero 18.3.4 zero-day DoS vulnerability has been dropped publicly on social network. February 16, 2025
    Posted by upper.underflow via Fulldisclosure on Feb 16Hello, About an hour ago, a group appearing to be named WyRCV2 posted a note on the nostr social network, which can be found at the following link: https://primal.net/e/note1vzh0mj9rcxax9cgcdapupyxeehjprd68gd9kk9wrv939m8knulrs4780x7 Save, share, use. The paste link includes a list of nodes that the attacker has instructed to target, along […]
  • Netgear Router Administrative Web Interface Lacks Transport Encryption By Default February 16, 2025
    Posted by Ryan Delaney via Fulldisclosure on Feb 16
  • [CVE-2024-54756] GZDoom <= 4.13.1 Arbitrary Code Execution via Malicious ZScript February 16, 2025
    Posted by Gabriel Valachi via Fulldisclosure on Feb 15In GZDoom 4.13.1 and below, there is a vulnerability involving array sizes in ZScript, the game engine&apos;s primary scripting language. It is possible to dynamically allocate an array of 1073741823 dwords, permitting access to the rest of the heap from the start of the array and causing […]
  • Re: Text injection on https://www.google.com/sorry/index via ?q parameter (no XSS) February 16, 2025
    Posted by David Fifield on Feb 15Today at about 2025-02-13 19:00 I noticed the "≠" is back, but now the type 0x12 payload of the ?q query parameter gets formatted into the string representation of an IP address, rather than being copied almost verbatim into the page. If the payload length is 4 bytes, it […]
  • SEC Consult SA-20250211-0 :: Multiple vulnerabilities in Wattsense Bridge February 13, 2025
    Posted by SEC Consult Vulnerability Lab via Fulldisclosure on Feb 12SEC Consult Vulnerability Lab Security Advisory < 20250211-0 > ======================================================================= title: Multiple vulnerabilities product: Wattsense - Wattsense Bridge vulnerable version: Wattsense Bridge * Hardware Revision: WSG-EU-SC-14-00, 20230801 * Firmware Revision: Wattsense (Wattsense minimal)...
  • APPLE-SA-02-10-2025-2 iPadOS 17.7.5 February 11, 2025
    Posted by Apple Product Security via Fulldisclosure on Feb 10APPLE-SA-02-10-2025-2 iPadOS 17.7.5 iPadOS 17.7.5 addresses the following issues. Information about the security content is also available at https://support.apple.com/122173. Apple maintains a Security Releases page at https://support.apple.com/100100 which lists recent software updates with security advisories. Accessibility Available for: iPad Pro 12.9-inch 2nd generation, iPad Pro 10.5-inch, […]

Customers

Newsletter

{subscription_form_1}