April 22, 2015 archive

Congrats to the Jitsi Team On Their Acquistion By Atlassian

Jitsi

Congratulations to Emil Ivov and the whole team behind Jitsi for their acquisition by Atlassian! As they say on the Jitsi news page:

The Jitsi Community just got a lot stronger! BlueJimp, founder of Jitsi, is now part of Atlasssian! The plan is to keep Jitsi at the cutting edge of innovation by keeping it open and in the hands of those who created it in the first place: the open source community.

The news is outlined in an article on TechCrunch and explained in more detail in a HipChat blog post.

To be clear, Atlassian is acquiring the company BlueJimp that employed the founders of Jitsi, but in the process they are also effectively getting the open source Jitsi project. It's great to read in their blog post, though, that they intend to continue to support and invest in the project.

I've been a big fan of Jitsi for quite some time as it was one of the earliest VoIP clients to support both IPv6 and DNSSEC. I wrote about this support both here and also over on the Deploy360 blog and recorded this video interview with Emil Ivov:

Previously I'd also written about Jitsi's support for DNSSEC as it was the first softphone to do so.

More recently I've been using Jitsi's WebRTC-based video bridge for some of the remote participation work we've been experimenting with inside the IETF.

It's all great work and I'm delighted that Emil and his team have found a home inside of Atlassian. I hope it works well for them all and I hope we see further evolution of Jitsi and other similar products.

Congrats to the whole team!


If you found this post interesting or useful, please consider either:


At RSA Conference Apr 23: Can DNSSEC and DANE Add a Layer Of Trust to TLS and DNS?

RSA Conference LogoCan DNSSEC and DANE add a layer of trust to TLS and DNS? That will be the question up for discussion tomorrow, April 23, 2015, at the RSA Conference in San Francisco. As part of the “Peer2Peer” small discussion sessions, Wes Hardaker from Parsons will be facilitating a session from 9:10-10:00am (PDT) with the description:

If we agree that the existing Certificate Authority (CA) system for TLS is broken, how do we fix it? Can the DANE protocol (RFC 6698) and DNSSEC provide a solid mechanism to add a layer of trust to network connections that use TLS? What do we need to do to use DANE and to get DANE more widely deployed? Join other peers in this discussion about how the DANE protocol works, how it is currently being implemented, (particularly in email and XMPP systems) and how DANE might be used in different scenarios. Bring your ideas and criticisms, and be prepared for a lively discussion.

If you are there at the RSA Conference in San Francisco and interested in DNSSEC, DANE and/or how we secure TLS, I would encourage you to stop by and engage in the discussion.   It is not a session being live streamed or anything like that and so you need to be at the actual conference to participate.

I wish I could be there myself… but I’m on the other side of the continent and so I’ll just have to learn from Wes how it went.

P.S. If you want to get started yourself with deploying DNSSEC and DANE, please visit our Start Here page.