![]() ![]() Zoom had referred to this setup as end-to-end encryption, but everyone else in the technology world disagreed. Zoom servers can see the content if they have to, and they do have to if anyone joins in from a phone. The end-to-end encryption will not be an option for users of the free Zoom service, so unfortunately, you won't be able to fully encrypt your cousin's Zoom birthday party.Ĭurrently, Zoom meeting content is encrypted from the client end (i.e., you) to the server end (i.e., Zoom). Once they collect the encrypted meeting traffic, they can use the key to decrypt it and recover the video and audio."We believe this will provide equivalent or better security than existing consumer end-to-end encrypted messaging platforms, but with the video quality and scale that has made Zoom the choice of over 300 million daily meeting participants, including those at some of the world's largest enterprises," Yuan wrote. If the Chinese authorities or any other hypothetical attacker with access to a key wants to spy on a Zoom meeting, they also need to either monitor the internet access of a participant in the meeting, or monitor the network inside the Zoom cloud. The report points out that Zoom may be legally obligated to share encryption keys with Chinese authorities if the keys are generated on a key management server hosted in China. This article details Zoom’s “surprising links to China” that were discovered by a team of researchers in Canada. The second problem is that Zoom has ties to China, which is a very bad jurisdiction for privacy. There are many articles covering the privacy and security concerns of Zoom, but you get the point.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |