Well, I’d have time on the 13.11, at 3:00 PM UTC. The question though would be how one would go about verifying how these programs route their traffic. Would Wireshark be sufficient?
The question though would be how one would go about verifying how these programs route their traffic.
With Tox its a matter of directly connecting to a peer after fetching their key from the network’s DHT. For other solutions its irrelevant as end to end encryption would protect you and make it immediately clear if the stream is MITM’d - when the ZRTP authentication strings don’t match.