[tor-bugs] #28942 [Circumvention/Snowflake]: Evaluate pion WebRTC

Tor Bug Tracker & Wiki blackhole at torproject.org
Thu Jun 20 20:25:07 UTC 2019


#28942: Evaluate pion WebRTC
-------------------------------------+-------------------------------
 Reporter:  backkem                  |          Owner:  cohosh
     Type:  enhancement              |         Status:  assigned
 Priority:  Medium                   |      Milestone:
Component:  Circumvention/Snowflake  |        Version:
 Severity:  Normal                   |     Resolution:
 Keywords:  ex-sponsor-19            |  Actual Points:
Parent ID:                           |         Points:
 Reviewer:                           |        Sponsor:  Sponsor28-can
-------------------------------------+-------------------------------

Comment (by backkem):

 Hi guys, sorry for the delay. Apparently, I didn't have an email address
 configured.

 Really cool to see this moving forward. We've had users run pion/webrtc on
 all sorts of platforms, including Windows and Android. Since the entire
 stack is in pure Go with little to no dependencies, it should be highly
 portable. We even act as a wrapper around the JavaScript WebRTC
 implementation when compiling to the JS/WASM build target.

 Some comments:
 - It may be worth considering the use of go modules to ensure you get all
 the correct dependencies when building pion/webrtc.
 - As mentioned in the original ticket and the SCTP PR, you can 'detach' a
 data channel to get access to the underlying idiomatic API based on the
 io.ReadWriteCloser.
 - There are good discussions about alternative signaling/rendezvous
 strategies in https://github.com/libp2p/specs/pull/159 and
 https://github.com/libp2p/go-libp2p-webrtc-direct/issues/14 that may be of
 interest.

--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/28942#comment:25>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online


More information about the tor-bugs mailing list