<< Click to Display Table of Contents >> Server and client installation > Technical details |
General
This chapter contains general information about servers, data encryption and other technical details related to data transfer and storage
All data is protected during the transfer by public-key cryptography and SSL. The security certificate for self hosted Virola can be defined by a user. If it is not defined, it is generated automatically on a server when it is launched.
For voice chats symmetric-key encryption AES is used. The keys are generated on the server when it is running and are renewed within specific time period. The keys are stored in RAM only while the server is running.
File of the Android app is uploaded to Google Play as Android Application Bundle, then it is converted to APK file by Google. An example of checking APK file for viruses: https://www.virustotal.com/gui/file/c3e664edbe833c8fee06167a98d810bbf5cd5a56e1b1f556ee620004db0ec1b5
1.Firebase platform from Google is used to send push notifications in Android Virola client app
2.APNs (Apple Push Notification service) platform is used to send push notifications in iOS Virola client app
run Virola Server with --help or -? or -h parameter to get help on Virola Server command line usage.
Example:
./virola_server_app.exe --help
You can run Virola Server with your own SSL certificate / Private key pair.
Example:
virola_server_app.exe --listen-host 127.0.0.1 --listen-port 7777 --database-dir ./storage --use-ssl --ssl-certificate ./cert.pem --ssl-private-key ./key.pem --ssl-private-key-password QWERTY
For detailed information please use Virola Server command line options help.