![]() ![]() ![]() Some servers allow for calling in to a meeting with a regular phone call. Using Jitsi Meet on untrusted servers may compromise the security the call. If you are planing to use it on another server and are in doubt, please ask digital protection trainers you know whether it is secure. It is important to only use Jitsi Meet on trusted servers, so we have recommended some of the servers we trust. Turning off everyone’s camera greatly improves the performance of the call.The mic picks up background sound which is transmitted and eats up bandwidth. Mute the mic when you are not speaking.Use a wired microphone instead of a bluetooth microphone.If you really need to work on other things during the call, consider using a different device. If you are the presenter, we recommend only opening the applications relevant to your meeting or presentation. Close other applications to conserve computer/phone resources and bandwidth. Refrain from doing other things on your computer/phone during the call.When using a computer, choose a wired connection rather than wireless, or at least position yourself closer to the wifi access point.If the meeting does need to be recorded, we suggest using a recording software on the computer, such as OBS Studio 6. We also recommend to avoid using the built-in "Start recording" feature, as a meeting recording could be uploaded to the cloud.For added security, at the bottom right of the screen, on the “i” icon or the app-menu, a password to join the meeting can be added (which should be shared with participants through a secure channel, such as Signal or encrypted email).Participants can share their screen to show presentations or documents.Beside it or in the app-menu 5, you can find the option to “raise hand” (to request to speak). In the bottom left corner of the screen there is an icon for the text chat space, which can be used by all participants.Microphone and video can be activated and deactivated at the bottom of the screen.The meeting room only exists when the first person joins, and disappears when the last person leaves.The "chat room" can be entered via link, which should be shared by the person organizing the meeting beforehand.It is recommended that all participants write their name or nickname, which will indicate who is speaking and so as to ensure that there are no unauthorised participants in the call.To use automatically generated links, click “Go” besides “Start a new meeting”.However, we would recommend avoiding the use of a "common" room name, as strangers can then easily find and enter your meeting. Jitsi Meet can generate a random link or you can write your own.Jitsi Meet can also be installed on your own internet server. To create the link and start the meeting we recommend the following trusted servers: When using a smartphone, we recommend downloading the Jitsi app, which is available for Android 2 3 and iPhone 4.There is also an option to use a Desktop program. When using a computer, we recommend connecting to a call using either the Firefox or Chrome browsers (other browsers may not work).When used on a trusted server, this tool can help to reduce the risk of surveillance, interference in calls and the sale and or mishandling of private information of participants. The software itself can be trusted, however it is important to use Jitsi Meet on a trusted server, such as those listed below. Jitsi Meet is open source and uses end-to-server/transit encryption, whereby your communication is encrypted before it leaves your device, and is then decrypted on the server, processed, and encrypted again before being sent to the recipient(s). Jitsi Meet is a free encrypted video conferencing software. Tips for safe communications using Jitsi Meet ![]()
0 Comments
Leave a Reply. |