Skip to main content

8 posts tagged with "privacy"

View All Tags

How to Enable End-to-End Encryption in Your Video App

· 5 min read
Bob Teng
Developer Advocate

In an age of heightened privacy concerns, offering End-to-End Encryption (E2EE) is one of the most powerful ways to build trust with your users. It provides a mathematical guarantee that conversations are confidential and that not even your server can access the media streams.

While the technology is complex, implementing it doesn't have to be. This guide will walk you through the two E2EE models available in Plug-N-Meet and show you how to enable them with a simple API call.

Privacy by Design: Why Plug-N-Meet is Built for the Zero-Trust Era

· 5 min read
Jibon L. Costa
Founding developer

In an era where data breaches are daily news and "free" services monetize your conversations, privacy can no longer be an afterthought. It must be the foundation.

When we built Plug-N-Meet, we didn't just want to create another video conferencing tool. We wanted to build a platform that respects the user's right to privacy by default. This meant making hard architectural choices—prioritizing security over easy data harvesting, and giving control back to the user rather than hoarding it on the server.

If you are building a telehealth platform, a legal consultation app, or simply a secure meeting space for your team, you need more than just a "secure" sticker. You need an architecture designed for the Zero-Trust era.

Here is how Plug-N-Meet delivers on that promise.

Click a Link, Join a Meeting: The "No Installation" Philosophy

· 4 min read
Bob Teng
Developer Advocate

Think about the last time a new application asked you to "download and install" something. A small wave of hesitation probably washed over you. Is this software safe? Will it slow down my computer? Do I have time for this? It's a moment of friction and uncertainty.

At plugNmeet, we believe that joining a video meeting should be as simple and frictionless as visiting a website. That's why we've built our entire platform around a core philosophy: No installation required.

This isn't just a convenience; it's a deliberate design choice that leads to a more secure, more private, and fundamentally better user experience for everyone.

From Black Box to Blueprint: Using Analytics to Understand Your Online Classroom

· 3 min read
Bob Teng
Developer Advocate

For many educators, the online classroom can feel like a black box. Did the quiet student understand the concept, or were they just disengaged? Which parts of the lesson sparked the most discussion? Was a student's abrupt departure a technical issue or did they simply leave?

In a physical classroom, a teacher can read the room. Online, they are often flying blind.

At plugNmeet, we believe that data, when used ethically and transparently, can provide the insights needed to transform this black box into a blueprint for better teaching. Our built-in analytics feature is designed not as a surveillance tool, but as a source of raw material to help you evaluate and improve your virtual classroom performance. And we've built it with a "privacy-by-default" philosophy.

What Does 'Free Video Conferencing' Really Cost You?

· 4 min read
Jibon L. Costa
Founding developer

When you search for "free video conferencing," you're looking for a simple, cost-effective way to connect with your team, clients, or community. The internet is full of "free" tiers from major SaaS providers, and they seem like the perfect solution.

But what is the true cost of "free"?

Too often, the price isn't on the invoice; it's hidden in the terms of service. You pay with your data, your brand identity, and your control. This article explores the hidden costs of "free" video conferencing and introduces a better, more empowering alternative.

Building a HIPAA-Compliant Telehealth Platform with an Open-Source Core

· 4 min read
Chaboud Simon
Community & Marketing Lead

The digital transformation of healthcare is accelerating, but for telehealth providers, the choice of communication technology is fraught with risk. Using off-the-shelf video conferencing tools can create a compliance nightmare. How do you ensure patient data is secure? How do you sign a Business Associate Agreement (BAA) with a public cloud vendor whose data practices are a black box? How do you create a seamless, trusted experience for your patients?

The answer is to own your stack.

Building a telehealth platform requires a foundation of absolute control over your data and infrastructure. This is why forward-thinking healthcare companies are turning to self-hosted, open-source platforms like plugNmeet to serve as the secure communication core for their applications. This article explains how.

Your Session, Your Browser: How We Use Client-Side Storage for Privacy and Resilience

· 3 min read
Chaboud Simon
Community & Marketing Lead

We’ve all felt that moment of panic. You’re in an important online meeting, the chat is full of crucial links, and then you accidentally hit refresh. Everything is gone. To solve this, many applications store your entire session on their backend servers. This allows them to restore your session, but it comes at a huge cost: your sensitive data is now stored permanently on someone else's hard drive.

At plugNmeet, we believe this is the wrong trade-off. We've made a deliberate architectural choice to use your browser's own storage to provide a resilient experience without compromising your privacy.

Our philosophy is simple: if we don't need the data on our server to make the service work, we don't touch it.

Who Holds the Keys? A Guide to plugNmeet's End-to-End Encryption Models

· 5 min read
Jibon L. Costa
Founding developer

In the world of secure communication, End-to-End Encryption (E2EE) is the gold standard. It ensures that only the participants in a conversation can decrypt and view the media streams, not even the server itself. At plugNmeet, we've implemented a robust E2EE model based on the WebRTC Insertable Streams API.

But "E2EE" isn't a single, one-size-fits-all solution. A critical question remains: where do the encryption keys come from, and who manages them?

plugNmeet offers two distinct models for managing E2EE keys, controlled by a simple setting: enabled_self_insert_encryption_key. Understanding the difference is key to choosing the right security posture for your application.