+91-9560121007

+1-929-243-5550

Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings

Determine 7: A Zoom name participant in the Ready Room, to be admitted to a Assembly Room.

4. How we Investigated

We started by observing Web site visitors related to Zoom conferences utilizing the Zoom purchasers on Home windows, MacOS, and Linux. We used Wireshark to report our Web site visitors whereas we joined and participated in Zoom conferences. The overwhelming majority of the Web site visitors throughout our Zoom conferences was exchanged between our laptop and servers owned by Zoom on UDP port 8801. A additional examination of the UDP site visitors revealed that Zoom had apparently designed their very own transport protocol, which wraps the well-known RTP protocol for transferring audio and video.