So, snakeoil of the highest order, then. On 23 July 2014 18:16:51 GMT+01:00, John Preston <gizmoguy1@gmail.com> wrote:
You can find the results of my inquiry below. ¬_¬
-------- Forwarded Message --------
From: Art Matsak <art@gruveo.com> To: John Preston <gizmoguy1@gmail.com> Subject: Re: Security specifics Date: Wed, 23 Jul 2014 18:34:28 +0200
Hi John,
Thank you for your interest in Gruveo. Gruveo uses WebRTC, an open technology for browser realtime communication. You can find details on its security architecture here:
http://tools.ietf.org/html/draft-ietf-rtcweb-security-arch-10
Please note that WebRTC is work in progress and its specifications may change in the future.
To answer your other questions, Gruveo is a proprietary product.
Best regards,
Art Matsak Founder and CEO Gruveo https://www.gruveo.com
On 23 Jul 2014, at 18:19, John Preston <gizmoguy1@gmail.com> wrote:
From: John Preston <gizmoguy1@gmail.com> Subject: Security specifics
Message Body: Hey all,
Like the idea, but I'd like to know about the specifics of how Gruveo is designed. Specifically: * what is the threat model? * what are the network protocol specifications? Packet formats, ciphers and modes, and semantics all critically determine the security of the system. * who owns the IP, and how is it licensed? * what's the development model like?
Thanks for your time, :) John
-- This mail is sent via contact form on Gruveo https://www.gruveo.com
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.