Going mobile with React Native and WebRTC How Jitsi Meet went from web to mobile, while sharing mos…

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=8riJVWElWQM



Duration: 14:35
122 views
4


FOSDEM 2019 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-06-25How libre can you go Reaching as many viewers as possible using only libre video technologies
2022-06-25GObject subclassing in Rust for extending GTK & GStreamer Or How to safely implement subclassing …
2022-06-25FreeBSD Graphics
2022-06-25How to build your own Ethereum client The development story of Nimbus
2022-06-25GStreamer embedded state of the union 2019
2022-06-25How Online Backup works in MyRocks and RocksDB
2022-06-25Gephi JS Exploring the dystopian future of a Javascript Gephi
2022-06-25How to create a useful MySQL bug report and make sure it's properly processed
2022-06-25How should lawyers behave Legal Ethics and Free Software
2022-06-25FreeBSD in Audio Studio FreeBSD is usually not the first choice for music art, but it has quite a l…
2022-06-25Going mobile with React Native and WebRTC How Jitsi Meet went from web to mobile, while sharing mos…
2022-06-25gtk rs newest and future developments Progress report on GTK Rust bindings
2022-06-25Getting To Blinky Virt Edition Making device pass through work on embedded ARM
2022-06-25Good Will Snapping ~10 benefits of publishing your application in the Snap Store
2022-06-25How to write a reverse proxy with Go in 25 minutes
2022-06-25Guile 3 Faster programs via just in time compilation
2022-06-25GraalVM Polyglot Development Platform with Great Toolability
2022-06-25How to write pylint plugins
2022-06-25Getting to Closer to a Software Help Language Untangling complexities of the LibreOffice Help
2022-06-25FreeIPA and cross distribution packaging experience
2022-06-25GWL GNU Workflow Language



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering