Analysis of information sources in references of the Wikipedia article "Jami (software)" in English language version.
Once an encrypted and authenticated peer-to-peer communication channel is available, the SIP protocol must be used to place a call and send messages.[permanent dead link]