Zoom, a videoconferencing service created for corporate webinars and meetings, has grown into something more amid the coronavirus outbreak.
With the number of daily users exploding from 10 million to 200 million from December to March, it has become a forum for nearly every kind of social function, including happy hours, yoga sessions, school classes, funeral services as well as Passover, Easter and (soon) Ramadan rituals.
But no sooner had many tried Zoom for the first time than they began to hear reasons they might want to stay away.
Trolls have crashed meetings, flashing porn or racist slurs on screens. Security researchers released report after report on newly discovered vulnerabilities including leaked emails and bugs that might have allowed hackers to access webcams.
Earlier this month, Google warned employees not to use Zooms desktop application on their work computers due to privacy and security vulnerabilities. SpaceX, the U.S. Senate and New York Citys school district have enacted similar restrictions.
If youre among the tens of millions of people who have become regular Zoom users in recent weeks, you may be wondering what all this means for you. Heres a primer on some of the notable privacy and security lapses and how to keep your calls and data safe.
Is Zoom sending my data to Facebook?
A Vice investigation showed that Zooms app for iPhones sent data about users devices to Facebook, including about users who did not have Facebook accounts. The company was hit with at least two lawsuits in federal court, one by a California resident who alleges Zoom violated the states new Consumer Privacy Act by disclosing information to Facebook without providing consumers with adequate notice or the ability to opt out.
Zoom Chief Executive Eric Yuan said in a blog post March 27 that the company removed code that sent user data to Facebook in an updated version of the iOS app. The company updated its privacy policy March 29 after a swell of concern from users.
I think Zoom wasnt completely honest, Electronic Frontier Foundation senior technologist Bill Budington said. I think they are going through a lot of growing pains.
How else might my information have been compromised?
Reports of Zooms vulnerabilities predate the coronavirus crisis. Last July, security researcher Jonathan Leitschuh exposed a flaw that allowed hackers to take over Mac webcams through the app. The company fixed the problem after a public interest research center filed a complaint with the Federal Trade Commission.
Thousands of personal Zoom videos were left viewable on the open web, including one-on-one therapy sessions, telehealth calls and elementary school classes, the Washington Post reported. Peoples names, phone numbers and intimate conversations were revealed and childrens faces and voices were exposed.
Experts say the company now seems to be making more serious efforts to identify and quickly patch vulnerabilities. It formed an advisory council of chief security officers from other companies and hired Alex Stamos, Facebooks former chief security officer, as an adviser. Thats a lot of money being thrown at the problem to improve security. That is not insubstantial, said Leitschuh, who discovered the Mac camera vulnerability last year.
Are Zoom calls encrypted, and does that matter?
Zoom marketed its communications as protected by end-to-end encryption, which makes it, in effect, impossible for anyone, including the company itself, to spy on them. Recently, however, the Intercept revealed Zoom has been using a different type of encryption, called transport encryption, which enables the company to decode the content of calls.
That means the company could hypothetically be susceptible to pressure from government authorities to disclose communications, said Bill Marczak, a fellow at the Citizen Lab and a postdoctoral researcher at UC Berkeley.
That doesnt make those calls uniquely vulnerable, however. Cellphone calls and Skype calls on default settings, for example, arent encrypted end to end either, and its unlikely the average person would need this type of security. But reporters or dissidents under oppressive regimes, government officials discussing classified information or big companies that want to keep their business strategies confidential might want to use a more secure platform, Budington said.
What information does Zoom give my boss or co-workers?
If youve been part of a long, boring webinar, you perhaps thought there would be no harm in checking your email or your Facebook feed to pass the time. So many were alarmed at the revelation of an attention tracking feature that allowed the meeting host to see when participants clicked away from the active Zoom window for more than 30 seconds. The company announced it had removed the feature in an April 2 blog post.
Thats not the only way hosts can gather information on attendees. They can also record audio and video from meetings and save a record of group chats. Some Zoom users were surprised to learn that if they use a tool that allows them to save the chat log from a call on their local deviceswhich many use as a way to document meeting minutesthat record will include private chats theyve sent in addition to messages the group has sent.
What is Zoombombing?
Because Zoom is so easy to use, it has also been easy for people to exploit the app to sow mischief or chaos. Zoombombing is when uninvited participants interrupt or derail a meeting. Sometimes its harmless trolling, but often it rises to the level of harassment.
As USC and local school districts transitioned to online meetings, they reported getting Zoombombed with racist taunts and pornographic images. Recently, Berkeley High School students were in the middle of a video conference when a man joined the Zoom meeting, exposed himself and shouted obscenities, the Mercury News reported.
The New York Times found scores of accounts on Instagram and on Reddit and 4Chan message boards where users coordinated to share meeting passwords and derail Zoom meetings.
Zooms default setting allowed anyone to join video calls if they had the meeting ID, which is a number 9 to 11 digits long. These meeting IDs are easy to guesswith an automated tool (called war-dialing), one could access thousands of meetings within a day by simply making a lot of guesses.
What are some steps I can take to make Zoom safer to use?
Be careful about how you share meeting IDs. Dont post them publicly.
Generate a new ID for every meeting you launch using the options panel, instead of using your personal meeting ID. That way, if someone gets ahold of your personal ID, future meetings wont be disrupted by Zoombombers.
You can toggle settings to ensure meeting participants need a password to access the meeting, which will further protect from disruption.
Enable Zooms Waiting Room feature, which lets meeting hosts keep would-be participants in a digital queue until they approve them to join the session. Beginning April 4, Zoom enabled the Waiting Room feature by default, requiring additional password settings for free users. Zoom has a guide to the feature on its website.
You can switch off a host of features that could be abused, if needed, including private chats, file transfers and custom backgrounds. The annotation feature, for example, could allow trolls to draw offensive shapes. You can also toggle the allow removed participants to rejoin option. Zoom has a guide to host controls on its website.
Keep your desktop app up to date, so that any patches Zoom makes to security vulnerabilities are added to your device.
If you want to be extra careful, use Zoom only on a mobile device, such as an iPad or an Android phone, because these versions go through review in the app stores.
What are some alternative platforms?
Signal and WhatsApp communications are encrypted end to end. WhatsApp allows encrypted calls with as many as four people. This is a suitable option for highly sensitive conversations.
There are also other video chatting services, such as Skype, Google Hangouts, Webex from Cisco, and FaceTime on Apple devices. Microsoft also offers powerful web, audio and video conferencing tools through its Microsoft Teams platform.
Whats the bottom line?
The reality is you cant see your friends, your classmates and maybe your co-workers right now. You cant eat at restaurants and you definitely cant go to bars. Zoom is one of the platforms people have ubiquitously adopted to replace these in-person interactions amid the coronavirus outbreak. And it works relatively well.
Its OK to use Zoom, experts say. Just be thoughtful about what youre using it for and observe a few precautions.
Excerpt from:
Is Zoom safe to use? Here's what you need to know - starexponent.com
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]