+91-9560121007

+1-929-243-5550

Move Fast and Roll Your Own Crypto: A Quick Look at the Confidentiality of Zoom Meetings

5. Conclusion: Not Fitted to Secrets and techniques

Zoom’s product is user-friendly and has rapidly grown its user base throughout the COVID-19 pandemic by “just working.” Zoom’s quick rising consumer base, mixed with advertising and marketing language round encryption and safety, have attracted many delicate conversations. This sudden reputation doubtless places the product in the crosshairs of authorities intelligence companies and cybercriminals.

Questionable Crypto & Encryption Keys Despatched to Beijing

Sadly for these hoping for privateness, the implementation of name safety in Zoom could not match its distinctive usability. We decided that the Zoom app makes use of non-industry-standard cryptographic methods with identifiable weaknesses. As well as, throughout a number of check calls in North America, we noticed keys for encrypting and decrypting conferences transmitted to servers in Beijing, China.