Strypey (was at Quitter.se) is a user on mastodon.nzoss.nz. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

Why does Jitsi Meet totally peak out my CPU, even with the camera turned off, and nobody else in the room with me? They must be running some bloated ass Javascript

I also notice that it take a few minute before my CPU (dual core 1.6Ghz) goes back to normal after I close the tab. Hmmmm ...

@strypey hey I've been wanting to test Jitsi. I often use ZOOM. It's proprietary but has great a feature set. I'd 100% prefer to drive eyes to something like Jitsi. Your experience sounds like I might need to use some caution.

@david_ross , but I tried logging in with , instead of , OB uses a bunch less CPU while idlng, and Jitsi Meet still pushed the CPU to 99% without doing anything but idlng with no cam. I also tried the instance () and it was just the same

@david_ross I'm excited about testing , the new app for the NC platform. I believe it's a rewrite of , so I'm hoping that means it's a bit more resource efficient than

@strypey I brought this up on a Mozilla vols call today. Thanks for the update!

@david_ross @strypey Please kill #WebRTC with fire until it is a crispy charred hunk of Zuul meat.

Thanks.

@Shufei @david_ross I don't know, is pretty useful. is built on it, for example

@strypey @Shufei I used WebRTC yesterday as a lightweight video conference tool with someone using Ubuntu who struggled with other platforms. It worked first time and seamlessly.

I genuinely don't understand the hate.

@david_ross it could be partisans grumpy about eating their lunch?

@strypey @david_ross Maybe :) A common complain is WebRTC's complexity and the fact it is baked in your web browser.

Aside from being a hudge attack surface, it tend to leak a lot of informations about both your local network and your video/audio devices. This together with webgl can give trackers a pretty accurate fingerprint of your computer.

Luckily, ublock origin can prevent most WebRTC leaks. It's an opt-in option though.

You can test that here: https://browserleaks.com/webrtc
Strypey (was at Quitter.se) @strypey

@Ninjatrappeur @david_ross hmm. Is it possible that the same thing that allows to stop leaking private data could also stop sevice based on it from working properly? Especially in combination with ?

Β· 0 Β· 1
@strypey @david_ross Could be. I did not manage to run jitsi in my day to day browser, had to install a vanilla one that I use for this purpose only.

@Ninjatrappeur @strypey whilst not at all ideal this is my preferred method on anything I do not trust. New user profiles are the quickest use I've found.

Seeking more info on some of those issues you spoke of. Complexity is not something of concern for me. The fingerprinting and attack surface are of course.

I am a little concerned of the blurring of this from the 2016+ drafts - and seek up-to-date insight on how IETF & browsers in general have moved since. Will update you.