Главная
Study mode:
on
1
Introduction
2
Agenda
3
What is WebRTC
4
Peertopeer browser communication
5
WebRTC architecture
6
Communication protocols
7
Session description protocol
8
Networking
9
Identity provisioning
10
Questions
11
General Observations
12
WebRTC Permission Model
13
Do you want to be involved
14
Two packs of privacy
15
What happens if you eavesdrop
16
Network attacker
17
DTLS
18
Maninthemiddle
19
Clone video
20
Endpoint authenticity
21
Identity provider
22
Fingerprinting
23
IP addresses
24
WebRTC weaknesses
25
Identity providers
26
Automatic identities assertions
27
Automatic identities assertion attack
28
Wrapup
29
Security consequences
30
Web permission model
31
Webpart authentication
32
New browser capabilities
33
Resources
34
WebRTC Magazine
35
Clientside Web Security Handbook
36
Any questions
Description:
Explore the security aspects of WebRTC in this comprehensive conference talk. Gain insights into the emerging web-based peer-to-peer technology, its architecture, and enabling technologies such as STUN, TURN, ICE, and DTLS-SRTP. Examine various deployment scenarios and identify basic security characteristics of WebRTC. Delve into the impact of WebRTC on the current web security model, uncovering potential weaknesses and open security challenges. Learn about the WebRTC permission model, privacy implications, and potential network attacks. Investigate endpoint authenticity, identity provisioning, and fingerprinting concerns. Analyze WebRTC weaknesses, including issues with identity providers and automatic identity assertions. Conclude with a discussion on the security consequences, web permission model, and new browser capabilities introduced by WebRTC. Benefit from resources such as WebRTC Magazine and the Client-side Web Security Handbook to further your understanding of this technology. Read more

WebRTC Security - Is Web-Based Peer-to-Peer Ready for Primetime?

Devoxx
Add to list
0:00 / 0:00