You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Many instances on the Jitsi Meet list use commercial services provided by Google/Alphabet, Amazon, Microsoft and/or Cloudflare which are suspected or even out-right known to spy on their users.
jitsi.random-redirect.de has a high chance of landing users on an instance with Google's STUN/TURN service and even a chance of sending them straight into Cloudflare or onto a Google or Amazon server. The users don't know about this. They don't know beforehand where they'll land. They don't know that the instance they land on is "dirty". And even if they knew, they couldn't do anything about it.
There is a way of knowing which instances are "dirty", and which are safe: The Jitsi Meet Handbook has a list of community-run instances with two columns which are important to check. One marks instances which don't use Google STUN/TURN; not even half of them avoid it.
The other one marks instances which run on Google, Amazon or Microsoft servers and/or through Cloudflare. This is the case with two instances on the random-redirect list: meet.ffmuc.net runs its Web frontend through Cloudflare which is relevant because it's the Web frontend which random-redirect redirects to. And meet.jit.si runs on Amazon AWS and uses Google STUN/TURN.
If data privacy protection is of any concern for random-redirect, all these instances should be removed from the list, and new instances should be checked before being added.
The text was updated successfully, but these errors were encountered:
Many instances on the Jitsi Meet list use commercial services provided by Google/Alphabet, Amazon, Microsoft and/or Cloudflare which are suspected or even out-right known to spy on their users.
jitsi.random-redirect.de has a high chance of landing users on an instance with Google's STUN/TURN service and even a chance of sending them straight into Cloudflare or onto a Google or Amazon server. The users don't know about this. They don't know beforehand where they'll land. They don't know that the instance they land on is "dirty". And even if they knew, they couldn't do anything about it.
There is a way of knowing which instances are "dirty", and which are safe: The Jitsi Meet Handbook has a list of community-run instances with two columns which are important to check. One marks instances which don't use Google STUN/TURN; not even half of them avoid it.
The other one marks instances which run on Google, Amazon or Microsoft servers and/or through Cloudflare. This is the case with two instances on the random-redirect list: meet.ffmuc.net runs its Web frontend through Cloudflare which is relevant because it's the Web frontend which random-redirect redirects to. And meet.jit.si runs on Amazon AWS and uses Google STUN/TURN.
If data privacy protection is of any concern for random-redirect, all these instances should be removed from the list, and new instances should be checked before being added.
The text was updated successfully, but these errors were encountered: