With offices and schools around the world temporarily shut amid the coronavirus crisis, the video platform Zoom has seen overnight success. But growing concerns over security across the platform have many consumers wondering about tech alternatives.
Privacy-minded consumers should consider video chat options carefully, said Arvind Narayanan, an associate computer science professor at Princeton University who has been outspoken about the security concerns surrounding Zoom.
There is a tradeoff between security and usability when picking a video-conferencing product, he said. Companies and schools should consider supporting multiple software options, configuring them securely, and educating their users about the risks.
Among the most important criteria for evaluating a video conferencing platform is end-to-end encryption of calls and data protection policies, said Charles Ragland, security engineer at Digital Shadows, a San Francisco-based security provider. Companies should be in compliance with privacy frameworks like Europes General Data Protection Regulation or Californias Consumer Privacy Act, he continued, and should also tell users what data is being collected and what third parties can access that data.
Here are some of your video-conferencing options for staying connected while sheltering in place:
The app is headquartered in San Jose, California, and was valued at $16bn when it went public in 2019. It quickly became the most popular option for meetings and other events moving online following shelter-in-place orders this year.
Pros: Its seamless to use attendees can join by a publicly shared link from anywhere, and joining does not require downloading any software. Its a great option if you are not discussing anything private or secure a virtual happy hour with friends, for example. The company has promised to fix issues with privacy and security, recently making default options more secure by requiring passwords to join meetings.
Cons: Zoom has had some glaring problems of privacy and security. Zoom bombings, in which hackers enter chat rooms to drop racist language and violent threats, persist. The company had to fix a bug that would have allowed hackers to take over a Zoom users Mac. It also had to change some of its policies after a Motherboard report found Zoom sends data from users of its iOS app to Facebook for advertising purposes.
The company also claimed its calls were encrypted, and then backtracked when it was proven wrong by a report in the Intercept. Senator Michael Bennet of Colorado has requested responses from Zooms CEO, Eric Yuan, on privacy concerns and the FTC is being called to investigate the company.
Released in 2003, Skype is one of the longest-standing options for video chatting. It was bought by Microsoft in 2011 and is a free option for one-on-one or group video chats.
Pros: Skype is free, easy to use and widely known.
Cons: The maximum number of people who can join a Skype meeting is 50, making it a difficult option for larger organizations or big get-togethers.
Schools in New York are transitioning from Zoom to Microsoft Teams, a work-from-home collaboration platform. The app has been gaining traction: Teams saw its daily active user count rise more than 37% during just one week last month, from 32 million to 44 million around the world.
Pros: The video platform allows for 250 people in a meeting or up to 10,000 viewers through its presentation feature. Users can easily share files and chat during meetings as well as screen-share. It is free and integrates with Skype.
Cons: The platform is built primarily for businesses, or teams. People who want individual access can do so via Skype accounts, but it appears to require a download of Skype to join meetings unlike Zoom, which lets users attend meetings through their web browsers.
The built-in video call option for Apple products is an often overlooked option for group video chats, but a strong one for a number of reasons.
Pros: Apple is known for its strong encryption practices, meaning the company cannot see what you share during a call. FaceTime is also free for Apple users and does not require the download of an app.
Cons: FaceTime is only available for users who have Apple devices, has a maximum of 32 users per call, and does not allow people to join by link, making it hard to spread the word about your online event in advance.
Signal is an encrypted messaging app widely considered to be the worlds most secure and it is increasingly going mainstream. It allows for large group chats, but not group video calls.
Pros: Its encrypted and free to download.
Cons: Signal does not allow for group video chats, but it is useful for one-on-one video chats that require strong security and encryption.
The Cambridge, England-based video conferencing provider Starleaf was founded in 2008 and has grown in popularity as it pitches itself as a more secure video-conferencing alternative to Zoom. Call volume on StarLeaf has grown more than 1,000% compared to February 2020, the company said by email.
Pros: Starleaf is based in the UK and subject to local data privacy laws there. It also allows the consumer to choose where their user data is stored. It is used by NHS trusts in the UK.
Cons: Rather than the individual consumer, it targets organizations with 500+ employees a good option for your company but maybe not for happy hour with your friends. Starleaf only hosts up to 20 people per meeting and has a maximum of 46 minutes per meeting.
This video-conferencing platform was founded in 2003 by a student in France, and it has gained popularity as a more secure alternative to Zoom.
Pros: Jitsi Meet is free; open-source, meaning outside parties can check its security; and encrypted.
Cons: It allows a maximum of 75 participants in a chat (and a better experience with 35 or fewer).
A series of now debunked reports claimed Houseparty had been breached rumors the company is now claiming were part of a paid commercial smear by a rival.
Pros: This is perhaps the most fun video-conferencing app, with a number of games within the app, including trivia and drawing challenges.
Cons: It appears that when you start a house party, anyone in your contacts can join, but it is possible to lock a room once the people you want to be there are in it. It also has questionable privacy policies and collects a worrying amount of information, according to one security researcher.
For those of us who use Gmail, Google Hangouts is a seamless option for video chats. Up to 150 people can participate in a chat, but only 25 people can participate in a video call at once.
Pros: Its free and accessible.
Cons: Use it with the knowledge that Google will have even more of your data than it already does. A hangout can be joined via Gmail, the Hangouts app or a Chrome extension but it requires a Gmail account.
The California-based video conference platform BlueJeans is a good option for work teams and meetings that require a little more security than a free Zoom session.
Pros: Videos are encrypted by default. BlueJeans can be accessed via browser and does not require an account or the download of a new program.
Cons: It is not free BlueJeans costs $9.99 for a basic plan that allows meetings up to 50 people and $13.99 for its pro product, which allows up to 75 people per meeting, among other features.
View post:
Worried about Zoom's privacy problems? A guide to your video-conferencing options - The Guardian
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]