While Jitsi is open-source, most people use the platform they provide, meet.jit.si, for immediate conference calls. They have now introduced a “Know Your Customer” policy and require at least one of the attendees to log in with a Facebook, Github (Microsoft), or Google account.

One option to avoid this is to self-host, but then you’ll be identifiable via your domain and have to maintain a server.

As a true alternative to Jitsi, there’s jami.net. It is a decentralized conference app, free open-source, and account creation is optional. It’s available for all major platforms (Mac, Windows, Linux, iOS, Android), including on F-Droid.

  • bedrooms@kbin.social
    link
    fedilink
    arrow-up
    17
    ·
    10 months ago

    Tbf I’d not get angry if it was jihadist recruitment, child porn, human trafficking, etc. etc.

    • knokelmaat@beehaw.org
      link
      fedilink
      arrow-up
      7
      ·
      10 months ago

      But won’t those criminals always find another way of communicating? If you’re doing something illegal, it’s worth it to you to go through some hoops to have safe and private communication. All this does is remove that option from less tech literate people.

      • Banzai51@midwest.social
        link
        fedilink
        English
        arrow-up
        18
        ·
        10 months ago

        But now the illegal content is not happening on their owned instance, taking them off the hook.

        • koper@feddit.nl
          link
          fedilink
          arrow-up
          3
          ·
          10 months ago

          Communication network providers in the EU generally aren’t liable for illegal activity of their users.

          • conciselyverbose@kbin.social
            link
            fedilink
            arrow-up
            5
            ·
            10 months ago

            That doesn’t make it a non-issue. Ignoring the obvious ethical issues, there are still serious costs to addressing conduct they’re made aware of, both in terms of actual man hours and mental health of any employees, and the actual bandwidth of the abusive traffic.