onyxwolf
April 8th, 2010, 05:30 PM
Telepathy Tubes sounds a lot like a tunneling protocol, but I can't find a straight answer to my question...
When you share your desktop through Empathy's new Share My Desktop feature, which apparently is possible through Empathy's Telepathy Tubes architecture, does it encrypt the session like a tunneling protocol does?
To go even deeper, which algorithms/encryption technologies does it use?
When you share your desktop through Empathy's new Share My Desktop feature, which apparently is possible through Empathy's Telepathy Tubes architecture, does it encrypt the session like a tunneling protocol does?
To go even deeper, which algorithms/encryption technologies does it use?