Are keys exchanged between devices before the data stream is sent?
The UDPi solution offers invisible keys, which are not exchanged, and the keys can be device specific, offering increased security. Since the keys are not exchanged between the devices before the data stream is sent to the screen (or receiver), someone cannot listen to the exchanged packet to retrieve the key. With UDPi, there is no exchange between the receiver and transmitter, which can present a security risk, since the key is changeable, detectable and possibly hackable in systems that use this method.