Jitsi Meet is a fully encrypted, 100% open source video conferencing solution. It uses the WebRTC protocol of your internet browser. There is no need to have an account.
WebRTC is the most secure voice and video calling technology available today on the market. It works with Chrome and most of Chromium based browser like Opera and Firefox. Browsers from Microsoft and Apple might have connection problems. When using Jitsi on a mobile device the Jitsi Meet application offers more comfort. The application can be downloaded in the Android or Apple market. You may also download the application form the f-droid repository for android phones.
All meeting rooms are ephemeral: they only exist while the meeting is actually taking place. They get created when the first participant joins and they are destroyed when the last one leaves. If someone joins the same room again, a brand new meeting is created with the same name and there is no connection to any previous meeting that might have been held with the same name. The meeting room will be password protected, the password will be changed in each room.
Jitsi meetings can operate in 2 ways: peer-to-peer (P2P) or via the Jitsi Videobridge (JVB). This is transparent to the user. P2P mode is only used for 1-to-1 meetings. In this case, audio and video are encrypted using DTLS-SRTP all the way from the sender to the receiver, even if they traverse network components like TURN servers.
In the case of multiparty meetings all audio and video traffic is still encrypted on the network (again, using DTLS-SRTP). Packets are decrypted while traversing Jitsi Videobridge; however they are never stored to any persistent storage and only live in memory while being routed to other participants in the meeting.
Any information they choose to enter, such as their name or email address is purely optional and is only shared with other meeting participants. We do not retain this information after the meeting.
Other pieces of data such as the chat, or speaker stats, for example, are stored for the duration of the meeting and then destroyed when it ends.
Jitsi is currently using Amplitude, Datadog and Crashlytics to cover various aspects of the apps and the infrastructure on meet.jit.si. Things that we track in analytics include, an anonymous identifier, bitrate, available bandwidth, SDP offers and answers, product utilization events, mobile app crash dumps (how much various product features are used overall). Most importantly, once your meeting is over Jitsi does not retain any names, e-mail addresses or profile pictures.