{"id":21671,"date":"2023-09-15T08:38:10","date_gmt":"2023-09-15T12:38:10","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/how-to-host-private-videoconferences\/21671\/"},"modified":"2023-09-26T19:11:40","modified_gmt":"2023-09-26T15:11:40","slug":"how-to-host-private-videoconferences","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/how-to-host-private-videoconferences\/21671\/","title":{"rendered":"How to host private videoconferences"},"content":{"rendered":"<p>Videocalls became much more widespread after the COVID-19 pandemic began, and they continue to be a popular alternative to face-to-face meetings. Both platforms and users soon got over the <a href=\"https:\/\/www.kaspersky.com\/blog\/videoconference-software-security\/35196\/\" target=\"_blank\" rel=\"noopener nofollow\">teething problems<\/a>, and learned to take <a href=\"https:\/\/www.kaspersky.com\/blog\/zoom-secure-video-conferencing\/40763\/\" target=\"_blank\" rel=\"noopener nofollow\">basic security measures<\/a> when hosting videoconferences. That said, many online participants still feel uncomfortable knowing that they might be recorded and eavesdropped on all the time. Zoom Video Communications, Inc. recently had to offer <a href=\"https:\/\/blog.zoom.us\/zooms-term-service-ai\/\" target=\"_blank\" rel=\"nofollow noopener\">explanations<\/a> regarding its <a href=\"https:\/\/www.zdnet.com\/article\/zoom-is-entangled-in-an-ai-privacy-mess\/\" target=\"_blank\" rel=\"nofollow noopener\">new privacy policy<\/a>, which states that all Zoom videoconferencing users give the company the right to use any of their conference data (voice recordings, video, transcriptions) for AI training. Microsoft Teams users in many organizations are well aware that turning on recording means <a href=\"https:\/\/learn.microsoft.com\/en-us\/answers\/questions\/874069\/recording-a-teams-meeting-also-activates-transcrip\" target=\"_blank\" rel=\"nofollow noopener\">activating transcription as well<\/a>, and that AI will even send premium subscribers a <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-teams-blog\/intelligent-meeting-recap-in-teams-premium-now-available\/ba-p\/3832541\" target=\"_blank\" rel=\"nofollow noopener\">recap<\/a>. For those out there who discuss secrets on videocalls (for instance in the telemedicine industry), or simply have little love for Big Tech Brother, there are less known but far more private conferencing tools available.\n<\/p>\n<h2>What can we protect ourselves against?<\/h2>\n<p>\nLet\u2019s make one thing clear: following the tips below isn\u2019t going to protect you from targeted espionage, a participant secretly recording a call, pranks, or uninvited guests joining by using leaked links. We already provided some <a href=\"https:\/\/www.kaspersky.com\/blog\/zoom-secure-video-conferencing\/40763\/\" target=\"_blank\" rel=\"noopener nofollow\">videoconferencing security tips<\/a> that can help mitigate those risks. Protecting every participant\u2019s computer and smartphone with comprehensive cybersecurity \u2014 such as <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0\u2014 is equally important.<\/p>\n<p>Here, we focus on other kinds of threats such as data leaks from the videoconferencing platform, misuse of call data by the platform, and the harvesting of biometric information or conference content. There are two possible engineering solutions to these: (i) hosting the conference entirely on participant computers and servers, or (ii) encrypting it, so that even the host servers have no access to the meeting content. The latter option is known as end-to-end encryption, or E2EE.\n<\/p>\n<h2>Signal: a basic tool for smaller group calls<\/h2>\n<p>\nWe have repeatedly described Signal as one of the <a href=\"https:\/\/www.kaspersky.com\/blog\/signal-privacy-security\/40377\/\" target=\"_blank\" rel=\"noopener nofollow\">most secure private instant messaging apps around<\/a>, but <a href=\"https:\/\/support.signal.org\/hc\/en-us\/articles\/360052977792-Group-Calling-Voice-or-Video\" target=\"_blank\" rel=\"nofollow noopener\">Signal calls are protected with E2EE as well<\/a>. To host a call, you have to set up a chat group, add everyone you want to call, and tap the videocall button. Group videocalls are limited to 40 participants. Admittedly, you\u2019re not getting any business conveniences such as call recording, screen sharing, or corporate contact-list invitations. Besides, you\u2019ll need to set up a separate group for each meeting, which works well for regular calls with the same people, but not so much if the participants change every time.<\/p>\n<div id=\"attachment_49049\" style=\"width: 1006px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164035\/how-to-host-private-videoconferences-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49049\" class=\"size-full wp-image-49049\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164035\/how-to-host-private-videoconferences-01.jpg\" alt=\"Signal lets you set up videoconferences for up to 40 participants in a familiar interface\" width=\"996\" height=\"915\"><\/a><p id=\"caption-attachment-49049\" class=\"wp-caption-text\">Signal lets you set up videoconferences for up to 40 participants in a familiar interface<\/p><\/div>\n<h2>WhatsApp and Facetime: just as easy \u2014 but not without their issues<\/h2>\n<p>\nBoth these apps are user-friendly and popular, and both support E2EE for videocalls. They share all the shortcomings of Signal, adding a couple of their own: WhatsApp is owned by Meta, which is a privacy red flag for many, while Facetime calls are only available to Apple users.\n<\/p>\n<h2>Jitsi Meet: self-hosted private videoconferencing<\/h2>\n<p>\nThe <a href=\"https:\/\/jitsi.org\/jitsi-meet\/\" target=\"_blank\" rel=\"nofollow noopener\">Jitsi<\/a> platform is a good choice for large-scale, fully featured, but still private meetings. It can be used for hosting meetings with: dozens to hundreds of participants, screen sharing, chatting and polling, co-editing notes, and more. Jitsi Meet supports E2EE, and the conference itself is created at the moment the first participant joins and self-destructs when the last one disconnects. No chats, polls or any other conference content is logged. Finally, Jitsi Meet is an <a href=\"https:\/\/github.com\/jitsi\/jitsi-meet\" target=\"_blank\" rel=\"nofollow noopener\">open-source app<\/a>.<\/p>\n<div id=\"attachment_49050\" style=\"width: 1110px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164046\/how-to-host-private-videoconferences-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49050\" class=\"size-full wp-image-49050\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164046\/how-to-host-private-videoconferences-02.jpg\" alt=\"Jitsi Meet is a user-friendly, cross-platform videoconferencing tool with collaboration options. It can be self-hosted or used for free on the developer's website\" width=\"1100\" height=\"756\"><\/a><p id=\"caption-attachment-49050\" class=\"wp-caption-text\">Jitsi Meet is a user-friendly, cross-platform videoconferencing tool with collaboration options. It can be self-hosted or used for free on the developer\u2019s website<\/p><\/div>\n<p>Though the public version can be used for free on the <a href=\"https:\/\/meet.jit.si\/\" target=\"_blank\" rel=\"nofollow noopener\">Jitsi Meet<\/a> website, the developers strongly recommend that organizations <a href=\"https:\/\/jitsi.github.io\/handbook\/docs\/devops-guide\/\" target=\"_blank\" rel=\"nofollow noopener\">deploy a Jitsi server of their own<\/a>. Paid hosting by Jitsi and major hosting providers is available for those who\u2019d rather avoid spinning up a server.\n<\/p>\n<h2>Matrix and Element: every type of communication \u2014 fully encrypted<\/h2>\n<p>\nThe <a href=\"https:\/\/matrix.org\" target=\"_blank\" rel=\"nofollow noopener\">Matrix<\/a> open protocol for encrypted real-time communication and the <a href=\"https:\/\/matrix.org\/ecosystem\/clients\/\" target=\"_blank\" rel=\"nofollow noopener\">applications<\/a> it powers \u2014 such as <a href=\"https:\/\/matrix.org\/ecosystem\/clients\/element\/\" target=\"_blank\" rel=\"nofollow noopener\">Element<\/a> \u2014 are a fairly powerful system that supports one-on-one chats, private groups and large public discussion channels. The Matrix look-and-feel resembles Discord, Slack and their forerunner, IRC, more than anything else.<\/p>\n<p>Connecting to a Matrix public server is a lot like getting a new email address: you select a user name, register it with one of the available servers, and receive a matrix address formatted as <strong>@user:server.name<\/strong>. That allows you to talk freely to other users including those registered with different servers.<\/p>\n<p>Even a public server makes it easy to set up an invitation-only private space with topic-based chats and videocalls.<\/p>\n<p>The settings in Element are slightly more complex, but you get more personalization options: chat visibility, permission levels, and so on. Matrix\/Element makes sense if you\u2019re after team communications in various formats, such as chats or calls, and on various topics rather than just a couple of odd calls. If you\u2019re simply looking to host a call from time to time, Jitsi works better\u00a0\u2014 the call feature in Element even uses Jitsi code.<\/p>\n<div id=\"attachment_49051\" style=\"width: 747px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164101\/how-to-host-private-videoconferences-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-49051\" class=\"size-full wp-image-49051\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2023\/09\/15164101\/how-to-host-private-videoconferences-03.jpg\" alt=\"Element is a fully featured environment for private conversations, with video chats just one of the available options\" width=\"737\" height=\"530\"><\/a><p id=\"caption-attachment-49051\" class=\"wp-caption-text\">Element is a fully featured environment for private conversations, with video chats just one of the available options<\/p><\/div>\n<p>Corporations are advised to use <a href=\"https:\/\/element.io\/\" target=\"_blank\" rel=\"nofollow noopener\">the Element enterprise edition<\/a>, which offers advanced management tools and full support.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Comparing user-friendly, secure alternatives to Zoom, Teams and Google Meet calling.<\/p>\n","protected":false},"author":2722,"featured_media":21673,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,9],"tags":[2309,43,97,2107,2282,520,2267],"class_list":{"0":"post-21671","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-end-to-end-encryption","10":"tag-privacy","11":"tag-security-2","12":"tag-signal","13":"tag-videoconferencing","14":"tag-whatsapp","15":"tag-zoom"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/how-to-host-private-videoconferences\/21671\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/how-to-host-private-videoconferences\/26212\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/how-to-host-private-videoconferences\/28910\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/how-to-host-private-videoconferences\/26520\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/how-to-host-private-videoconferences\/26680\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/how-to-host-private-videoconferences\/29172\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/how-to-host-private-videoconferences\/28023\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/how-to-host-private-videoconferences\/36100\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/how-to-host-private-videoconferences\/49045\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/how-to-host-private-videoconferences\/20999\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/how-to-host-private-videoconferences\/21831\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/how-to-host-private-videoconferences\/30537\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/how-to-host-private-videoconferences\/34703\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/how-to-host-private-videoconferences\/26791\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/how-to-host-private-videoconferences\/32521\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/how-to-host-private-videoconferences\/32175\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21671","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=21671"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21671\/revisions"}],"predecessor-version":[{"id":21718,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/21671\/revisions\/21718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/21673"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=21671"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=21671"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=21671"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}