What authentication and encryption is used?

I could find no documentation on what encryption and authentication is used and how it’s implemented. This is concerning, especially if the remote microphone feature is used.

Can the developer provide a detailed explanation of how both phone and computer devices are authenticated and also how encryption is used for the audio data, especially for remote microphone?

1 Like