►
From YouTube: TPAC 2019 WebRTC meeting @Friday part 2
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
B
A
So
basically,
a
lot
of
the
activities
occurred
in
the
last
week,
which
conveniently
was
too
late
for
me
to
the
month
of
the
slides,
but
people
keep
bringing
up
new
use
cases.
Although
I'm
not
necessarily
writing
up
the
use
cases,
they
just
create
issues
for
use
cases.
They,
like
people,
write
up
the
problem
with
that
is
in
some
cases
the
use
cases
are
elaborate
enough.
That
really
should
be
the
people
who
forming
issues
when
creative
economy
mazuma
necessarily
such
as
DHT,
so
that's
kind
of
where
we
are
on
the
next
slide.
A
D
D
D
D
D
D
D
C
E
C
A
A
F
There's
also
another
aspect
of
it
is
webs.
For
example,
in
chrome
you
have
a
corrosion
is
configured.
Troy
is
a
hardware
if
the
parameters
are
not
supported
by
the
encoder
fallback
to
software,
which
in
this
case
well,
you
can
do
anything.
The
software
is,
has
mold
abilities,
but
you
don't
really
know
when
you're
going
to
switch
from
hardware
to
sort
of
a
base
and
because
because
you're,
using
our
writers
that
are
not
adequate
for
tinkerer
and.
E
A
E
E
E
I
C
Is
my
preference?
What
if
what,
if
you
prefer
something
other
than
me?
Why
can't
I
do
something
where
you
can
use
a
Harvard
decoder
and
I
can
use
a
hardware
encoder
or
they
could
be
a
mix
mix?
We're
loading
lot
more
expensive,
so
I'll
use
and
you
can
think
of
different
applications
wanting
to
do
different
things.
But
if
I.
C
E
B
A
C
C
We
should
really
Renta.
Oh
it's
something
was
wrong
and
I
come
back
to
this
other
communication.
That
seems
more
like.
Maybe
there
should
be
an
event,
and
maybe
if
it
turns
out
that
what
I'm
trying
to
do
is
it
possible,
then
that
the
application
most
likely
switch
to
something
else.
I
think
I
could
be
ill
rather
than
think
of
the
big
issue.
Right
now
is
I,
don't
even
know
what
to
negotiate.
I
don't
need
to
know
which
Star
Trek
to
come.
E
Easy
for
website
that
is
leaning
yeah
and
they
have
some
mystics.
There
might
be
some
libraries
when
our
little
Secretary's
over
here
as
well,
so
it
might
be
interesting
to
see
what
they're
doing
there
and
check
for
some
patterns
get
to
then
get
it
video
for
us
and
ask
hey.
How
are
you
doing
doing
these
things,
but
my
help
as
well
yeah.
F
F
One
of
the
issue
is
that
we
have
automatic
fallback
to
software.
There
is
provision
in
the
spec
when
using
set
founders,
to
actually
return
an
error
when
the
hardware
encourages
and
supports
set
families-
yes,
but
because
there's
a
software
fall
that
will
never
get
into
the
case.
Yes,
but
we
don't
have
any
way
to
select
which
one
is
going
to
be
horribly
is
a
software
is
so
named
that
fall
back
right
now,
if
we
had
to
make
an.
B
F
C
C
C
I
J
A
Yeah
I
mean
a
good
one
might
be
like
the
mobile
use
case,
where
something's,
if
you
don't
have
her
acceleration,
they
just
become
so
battery
draining
it's
just
as
useless.
So
that
might
be
a
good
context
and
others.
You
have
a
mobile
device.
You
kind
of
need
that
control,
because
otherwise
here
comes
with.
C
F
The
convention,
maybe
the
simplest
set
of
API,
is
where
into
capabilities
you
get
a
December
level
on
the
decoder
level.
You
have
something
that
is
quite
pcs.
Your
Hardware
only
an
ordered
system,
hardware
with
software
or
business
software
only
and
possibly
in
a
chronic
parameter
vacancy.
Please
make
sure
it's.
F
C
K
A
A
A
So
this
one
is
a
issue
any
PR
relating
to
secure
web
conferencing,
and
it
you
may
recall
this
is
our
second
attempts
to
try
to
develop
a
use
case
or
actually
more
than
one
use
case
for
secure
web
opportunity,
and
we
have
before
us
the
submission
by
Collin
Jennings,
with
some
editing
and
also
additional
requirements.
Basically,
Cullen
divided
his
requirements
into
two
years
cases.
A
One
use
case
where
JavaScript
is
trusted
in
another
use
case
where
it
is
not
trusted,
and
in
both
of
these
use
cases,
the
common
server
is
considered
not
trusted
to
have
access
to
clear
text,
media
so
kind
of
the
main
point
of
it.
Is
you
don't
want
this
thing,
stooping
on
your
conference
and
recording
it
without
permission?
Things
like
that,
so
he
divided
it
up
into
two
use
cases,
and
the
second
thing
was:
he
met
suggested
that
well
originally
imposed
to
just
student
submission.
A
There
weren't
any
requirements,
and
so
he
met
suggested
that
we
look
at
the
MLS
security
architecture
for
the
kind
of
security
requirements.
Next
next
slide
that
that
we
that
we
might
want
to
talk
about
defining
what
we
mean
by
secured
web
conferencing
in
a
little
bit
better
way,
and
that
seemed
like
a
good
suggestion,
and
so
what
I
did
is
to
look
at
the
MLS
security
architecture
and
kind
of
put
in
some
of
the
guarantees
that
they
talk
about
now.
I
think
it's
correct
to
say
nothing
in
MLS
you
may
get.
A
That
they
can
provide
so
as
an
example
in
25
is
that
only
current
group
members
can
receive
media
or
text
sent
to
the
group.
So
if
you
leave
the
group
I'm
who's
access
to
to
what
was
going
on
and
in
26
is
a
group
member
cannot
send
media
or
text
that
appears
to
be
from
another
group,
so
this
actually
was
something
that
MLS
allows
you
to
do
to
prevent
this
kind
of
spoofing,
which
other
architectures
searches
perfectly
not
so
this
was
an
interesting.
This
is
an
interesting
property
that
MLS
has
in
27.
A
Is
the
common
server
must
not
have
access
to
clinics,
media
or
text
or
to
be
a
potential
identity
include
matters.
This
is
the
identity.
One
is
interesting.
I
think
this
is
included
potentially
in
MLS
as
well.
The
concern
here
is
that,
in
you
know,
when
the
questions
is
to
call
something
secure
web
company,
what
exactly
are
you
protecting
against
what
security
are
you
providing?
A
So
it's
one
thing
to
say:
yeah,
you
don't
have
the
clear
text
media
but
if
I
know,
for
example,
un
and
his
friends
were
there
in
the
group
and
un
spent
most
of
the
time
talking
I
kind
of
know,
a
lot
about
what
went
on
even
though
I
may
not
have
captured
everything.
You
had
said.
I
still
know
an
awful
lot
about
the
meeting,
and
maybe
it
should
be
possible
to
not
be
able
to
get
that
as
well.
So.
A
Actually,
that's
a
great
question:
they
don't
have
to
be
exactly
the
same
thing.
I
was
thinking
it
would
be.
So
you
know
you'd
kind
of
signal
to
the
central
server
who
was
on
and
off,
without
necessarily
having
to
provide
the
identities
of
everything
all
verify.
A
Of
every
single
person
possible,
it
is
a
question
because,
basically
one
one,
there
were
trade
officer
because
one
of
the
things
is
there's
a
heron
weakness
in
secure
web
conferencing,
which
is
that
you
don't
know
who's
in
the
conference.
You
can
always
have
somebody
recording,
oh
yeah,
there's
this
extra
person
there
I,
don't
really
know
what
they
are
just
turns
out:
they're,
just
real
and
sort
of
the
station,
that's
their
record
apocalypse
and
then
you've
kind
of
accomplished
nothing.
A
So
there
are,
you
know,
that's
kind
of
where
some
folks
into
some
of
the
weber,
identity,
people
say
well
I
need
to
know
the
identity
because
I
need
you
know
it's.
You
know
someone
trusted.
The
group
is
close
to
someone
else,
but,
on
the
other
hand,
you're
giving
basically
all
of
this
information
to
the
top
end
server,
all
the
metadata
as
well.
So
when
they
do,
we
need
to
talk
about
that.
One.
A
A
little
more
in
28
is
perfect
forward
secrecy
agency,
PFF,
sorry,
and
what
that
means
is
you
have
if
you
have
access
to
the
encrypted
traffic
as
well
as
all
current
key
material
and
does
not
collect
I'm?
Sorry
PFS
yeah
does
not
compromise
the
security
of
media
to
text
older
than
the
oldest
key
of
a
compromised
client.
A
Spf
SMS
BTS
and
then
there's
pcs,
which
is
protection
against
past
or
future
device
compromised.
So
somebody
compromises
the
device
will
have
information
you
get
against
future
region
in
occasions.
So
these
are.
These
are
the
security
properties
that
MLS
talks
about
and
in
general
they're
ours
considerably
stronger
than
some
of
the
things
that
are
in
permit
it,
particularly
with
respect
to
things
I
think
even
perc
doesn't
really
have
PMS
right
kind
of
such
a
strong
consensus
for
instead.
H
A
M
A
G
G
H
M
K
G
K
H
M
M
And
the
result
of
no
chapter
there
is
unclarity
right
now
about
which
of
these
changes
will
done
in
process
2020
if
they
do
land
on
process
to
economy.
That
is
not
time
frame.
I
would
suggest
that
if
we
see
this
is
the
direction,
this
is
going
to
ask
for
Java
extension
rather
than
anything
else,
a
short
extension
so
that
we
can
take
this
tentative
consideration.
You
know
rough
chapter,
that
being
saying,
because
there
is
uncertainty
and
because
I
think
the
discussion
that
we
need
in
any
case
are
useful
with
us.
M
As
I
mentioned,
the
leaving
smell
another
another
thing
that
process
2020
is
considering,
which
is
somewhat
related,
but
different
is
also
having
a
dedicated.
Where
there's
three
process,
others,
you
see,
has
I
envy.
Your
any
understanding
would
be
useful
for
web
starts.
We
mentioned
earlier
another
case.
M
M
M
M
M
M
E
M
M
B
M
I
imagine
he
contributed
to
recommendations
about
to
see
the
capture
and
streams.
Again,
we've
already
identified
small
additions
that
we
can
fit.
You
know
video.
There
will
be
dance.
There
has
been
a
constant
stream
of
issues
on
the
ripples.
I
don't
expect
that
just
because
we
contaminate
relation
to
be
stopping
this
effect,
we
need
attention
and
discussion
zones,
so
my
expectation
is
that
we
will
move
on
to
do
like
small
upgrade
to
these
recommendations.
If
we
don't
have
the
new
process,
this
movie
was
our
interactions
of
all
time.
M
M
M
Some
of
them
are
specific
to
communications
and
some
of
them
more
about
India
capture.
So
what
at
least
that's
I
think
very,
very
specific
community
I
think
making
progress,
but
I
I,
don't
see
will
be
done
by
much.
It's
also
the
question
of
how
do
we
integrate
very
three
aspect
at
the
stack
we
have
a
proposal
for
this
particle
right.
M
M
So
the
first
one
is
already
a
candidate
whoo.
You
guys
done
hoods
done.
Peta
has
been
so
many
new
issues
ahead,
but
a
snowshoe.
We
are
still
need
implementation.
Experience
that
one
good
when
we
get
done
gradually
quickly.
Once
we
had
dishes
screen
capture
has
a
lot
of.
In
addition,
master
has
issues.
Husband
comes
from
the
whole
horizontal
videos,
which
is
like.
B
M
You
all
the
issues
at
the
trends.
One
thing
we
do
need,
if
we
do,
that
is
clear:
it
was
commitment
most
of
these
eggs.
The
vehicle
specialist
have
a
lack
of
commitment,
so
I'm
not
saying
we're
going
to
solve
this
today.
But,
as
you
think
about
these
questions,
we
also
need
to
understand
which
individuals
or
organizations
are
resources
behind
specifications
because
trying
to
save
it
won't
work
any
issue,
but
he
does.
M
B
M
B
M
M
No,
there
is
no
when
you
find
equations.
That
is
what
the
practice
is
for
me.
We
would
publish
current
technical
about
the
geography
month
as
a
note,
and
we
would
say,
go
and
see
this
community
from
document
Alexa
why
she
gr
something
hands
to
get
the
next
step.
How
that
hockey
or
interesting
and
III
think
doing
this
I.
M
M
Silicon,
exactly
so
I
mean
I,
don't
have
a
specific
I
know
that
when
we
discuss
about
a
strong
feeling
that
all
of
the
process
was
reserving
names
that
were
wooden
in
flash
over
time
but
I
agree,
the
composition
is
more
complex
circuits.
There
are
actual
depravity
to
be
pronounced,
insisted
we
come
to
say
anybody
can
run
without
a
stranger
when
exposed.
B
M
M
M
M
M
M
M
M
M
M
One
thing
I
wanted
to
mention:
a
number
of
working
groups
have
started
having
these
your
model.
Where
say
there
is
a
working
group
where
starvation
process
and
work
happen,
and
there
is
a
related
sister
Rita
group,
where
all
the
incubation
crazy
ideas
that
what
happened
for
quite
some
time,
I
would
say
you
are
TCC
played
at
home,
but
there
may
be
reason
for
having
more
closely
related
web
RTC
Kregel
class
among
his
work
will
be
done
without
taking
as
much
brain
power
from
working
not
pushing
that
specific
problem.
B
M
I
M
A
We
have
six
months,
you
know
March
to
try
and
get
things
in
and
the
thing
is
you
know,
depending
on
the
new
process,
particularly
some
of
these
things
like
stats
or
they
probably
are
living
documents.
So
we
kind
of
get
them
to
the
point
where
they
can
be
living
documents.
They
have
had
the
basic
review
and
you
know
horizontal
in
tag
and
all
that
stuff
basic
security.
You
know
gone
from
being
to
at
least
get
them
to
the
point
where
they
can
evolve.
As
you
know,.
M
E
High
quality
documents
and
high
quality
documents,
not
only
tomorrow,
but
until
yes
from
now,
this
technology
being
used
and
a
smooth
stream
of
issues
cleaning
and
you
should
be
responsible
to
maintain
that
is
very
important
and
that's
a
salmon
river.
It's
giving
each
working
group
or
somewhere
else
yeah.
So
if
we
could
like
even
gain
time
in
not
going
beyond.
B
B
A
B
I
K
E
A
C
Scooch
Awards
new
things,
and
as
long
as
you
have
people
working
on
these
new
things,
it
makes
sense
for
those
tip-ups.
You
also
take
care
of
this
surrounding
polishing
work,
but
I
think
if
there
isn't
active
work,
one
area
okay,
I
mean
so
there
won't
be
any
polishing.
On
the
other
thing.
There's
gonna
dedicate
time
to
polish
aspect
that
they're
not
working
on
for
the
supposedly
for
really
work.
Oh
yeah,
where
you'd
be
willing.