Those accusations conveniently ignore an important point: Practically none of Zoom’s competitors provide e2e, either. But the news that it was going to leave free users without end-to-end encryption provoked a lot of criticism: Zoom was accused of collaborating with intelligence agencies, or at least of leaving the door open for them. The service plans to add end-to-end encryption of video calls, for which purpose it has even acquired Keybase, a company specializing in secure messengers and apps for data exchange.Īt first, Zoom planned to provide maximum-level privacy to paid subscribers only. Lastly, users will soon be able to communicate without anyone - outsiders or Zoom employees - being able to eavesdrop. In addition to being more secure, GCM is considered less demanding on resources, so better encryption doesn’t mean sacrificing computer performance. If you like such esoteric details (and who doesn’t?), you’ll be interested to learn that Galois/Counter Mode now handles the integrity check. Second, the integrity of transmitted data is now checked - a protection measure against intruders who might corrupt or alter an encrypted message without deciphering it. First, Zoom now uses longer (and hence more reliable) encryption keys. The developers have upgraded the encryption algorithm as well. Now, during free conferences the service does not display notifications at all and does not show chat when screen sharing, even if it is open. That could lead to an awkward situation if, say, someone wrote you a personal message during screen sharing. The old Zoom always showed previews of chat messages in notifications. So, if your data is routed somewhere else, you can find out about it and complain to the developer. In addition, all conference participants can now see which data center they are connected to by clicking the “i” icon within the upper left corner of the screen. If for some reason the conversation has to remain inside your home country, then you have nothing to worry about: Free conferences will stay in the domestic region, and paid subscribers, as of April 18, can choose which countries their information goes through. Now your video call will not be routed by mistake to a Chinese or other foreign server. Zoom’s approach to data routing has also changed. And with a business account, you can block unauthorized users or those with a certain type of e-mail address domain (for example, public instead of corporate) from connecting. Owners of paid accounts can also require members to supply information about themselves: name, e-mail address, and the like. Second, you can now prevent participants from renaming themselves. First, passwords and the Waiting Room feature, which requires a host’s permission to join a conference, are now enabled by default. Anti-troll protectionĪ number of new settings stop invasions by anonymous trolls. Click on the shield icon in the conference menu to open the security settings. Here you can restrict user rights, block access to meetings to keep out uninvited guests, add watermarks to screenshots and audio recordings in case someone decides to publish them, and so on. Starting with Zoom 5, all settings for managing conference participants appear in one place. Previously, large companies and institutions turned their noses up at Zoom, but it now has the seal of approval of New York’s attorney general and is back in NYC schools, and version 5 brings with it some useful features. The change in security focus quickly bore fruit. As a result, version 5.0 has changed a lot from precoronavirus Zoom. One such case is Zoom, whose developers have, as promised, given the app a data-protection makeover. However, technologies can develop very rapidly, especially those in the spotlight. Not so long ago, we explained how to configure Zoom to make it safer to use.
0 Comments
Leave a Reply. |