[tor-bugs] #28942 [Circumvention/Snowflake]: Evaluate pion WebRTC
Tor Bug Tracker & Wiki
blackhole at torproject.org
Thu Jun 20 20:25:07 UTC 2019
#28942: Evaluate pion WebRTC
-------------------------------------+-------------------------------
Reporter: backkem | Owner: cohosh
Type: enhancement | Status: assigned
Priority: Medium | Milestone:
Component: Circumvention/Snowflake | Version:
Severity: Normal | Resolution:
Keywords: ex-sponsor-19 | Actual Points:
Parent ID: | Points:
Reviewer: | Sponsor: Sponsor28-can
-------------------------------------+-------------------------------
Comment (by backkem):
Hi guys, sorry for the delay. Apparently, I didn't have an email address
configured.
Really cool to see this moving forward. We've had users run pion/webrtc on
all sorts of platforms, including Windows and Android. Since the entire
stack is in pure Go with little to no dependencies, it should be highly
portable. We even act as a wrapper around the JavaScript WebRTC
implementation when compiling to the JS/WASM build target.
Some comments:
- It may be worth considering the use of go modules to ensure you get all
the correct dependencies when building pion/webrtc.
- As mentioned in the original ticket and the SCTP PR, you can 'detach' a
data channel to get access to the underlying idiomatic API based on the
io.ReadWriteCloser.
- There are good discussions about alternative signaling/rendezvous
strategies in https://github.com/libp2p/specs/pull/159 and
https://github.com/libp2p/go-libp2p-webrtc-direct/issues/14 that may be of
interest.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28942#comment:25>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
More information about the tor-bugs
mailing list