{"id":62423,"date":"2015-03-21T21:51:07","date_gmt":"2015-03-22T01:51:07","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/jitsi-secure-im-voip-security-in-a-box\/"},"modified":"2015-03-21T21:51:07","modified_gmt":"2015-03-22T01:51:07","slug":"jitsi-secure-im-voip-security-in-a-box","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/jitsi\/jitsi-secure-im-voip-security-in-a-box\/","title":{"rendered":"Jitsi &#8211; secure IM &amp; VoIP | security in-a-box"},"content":{"rendered":"<p><p>    Now that you added and authorised your contact, you can click    on their name in the contact list and initiate text    conversation, voice or video calls, and desktop sharing, by    choosing the relevant icon under their name:  <\/p>\n<\/p>\n<p>    Figure 5: Selected contact in the Jitsi main window with    icons for IM, voice or video call and desktop sharing  <\/p>\n<p>    Step 1. We will now explore one of Jitsi's    most important features: the ability to text chat securely,    encrypting your messages with OTR. OTR functions in a similar    manner to GPG\/PGP    described in other chapters in this toolkit. Just as with PGP,    before you and your contact can encrypt your communications,    you both need to configure Jitsi to generate    your encryption keys. You can do this by selecting    Tools > Options menu and    selecting the Security tab and    Chat sub-tab. You will then see a    window similar to one shown in the image below:  <\/p>\n<\/p>\n<p>    Figure 6: Part of the chat options window where you can    generate encryption keys for your text chats  <\/p>\n<p>    Step 2. Next, click the    Generate button. As a result you will    see the fingerprint of the key that has been generated:  <\/p>\n<\/p>\n<p>    Figure 7: Part of the chat options window showing    fingerprint for your generated OTR encrypted text chat  <\/p>\n<p>    One key is generated per account. You only need to do this    again if you add a new account or install Jitsi on another    device and do not move the existing keys to it.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityinabox.org\/en\/guide\/jitsi\/windows\" title=\"Jitsi - secure IM &amp; VoIP | security in-a-box\">Jitsi - secure IM &amp; VoIP | security in-a-box<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Now that you added and authorised your contact, you can click on their name in the contact list and initiate text conversation, voice or video calls, and desktop sharing, by choosing the relevant icon under their name: Figure 5: Selected contact in the Jitsi main window with icons for IM, voice or video call and desktop sharing Step 1. We will now explore one of Jitsi's most important features: the ability to text chat securely, encrypting your messages with OTR <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/jitsi\/jitsi-secure-im-voip-security-in-a-box\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94876],"tags":[],"class_list":["post-62423","post","type-post","status-publish","format-standard","hentry","category-jitsi"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/62423"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=62423"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/62423\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=62423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=62423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=62423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}