Blog Post
Streaming Media
The Many Ways to Stream Video Using RTP vs RTSP
RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
Blog Post
Video
The Importance of Encrypting Video Over IP
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components:
1. The attackers are able to view video being streamed across a network, and
2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network.
The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.
Blog Post
Outsourced Engineering
Welcome to the Peak
Welcome to our blog! We see this blog as an experiment with social media....
RTP and RTSP are commonly used protocols to stream video over the internet. This blog post highlights the differences between them, pros and cons, and how to implement them on your devices.
I just read a report of a new IP security vulnerability being demonstrated today at the DefCon hacker's conference in Las Vegas. The new hack has two components:
1. The attackers are able to view video being streamed across a network, and
2. The attackers are able to use a man-in-the-middle attack to insert video controlled by the attacker to a video decoder somewhere on the network.
The linked video shows viscerally how an attacker could foil a security/surveillance video system — a modern-day Thomas Crown Affair.
Welcome to our blog! We see this blog as an experiment with social media....