Readit News logoReadit News
hunter2_ · 6 years ago
The fact that they show end users (no pun intended) an "end-to-end encrypted" badge on the meeting window itself, and elsewhere explain how a Zoom server (not Zoom client) is what constitutes an "end" despite the whole rest of the electronic communication industry using "end-to-end" to refer exclusively to user agents, is bonkers.
paulryanrogers · 6 years ago
Agreed. It's unlikely they stumbled onto an industry standard phrase like that alone, then innocently used it without knowing the generally accepted meaning. This is deceptive advertising.
LeifCarrotson · 6 years ago
Not just "deceptive" nor "unlikely", it's blatant false advertising.
wwweston · 6 years ago
Using industry standard phrases without a complete understanding of meanings is... well, industry standard. ;)

Deleted Comment

intopieces · 6 years ago
Not defending zoom here -- they done fucked up -- but there is a huge disconnect between the marketing folks and the technical folks. It's possible that E2E Encryption was something they planned on implementing but haven't, and the marketing department either didn't get the memo or didn't understand and still kept the wording.
throw_away · 6 years ago
Using their definition, one would wonder what non-end-to-end encryption would look like.
gowld · 6 years ago
Encryption at rest but not in transit.
Diggsey · 6 years ago
If one is to believe their blog post (https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-...), then they do in fact use end-to-end encryption:

> To be clear, in a meeting where all of the participants are using Zoom clients, and the meeting is not being recorded, we encrypt all video, audio, screen sharing, and chat content at the sending client, and do not decrypt it at any point before it reaches the receiving clients.

The first problem is:

> Zoom currently maintains the key management system for these systems in the cloud.

Obviously, this compromises many of the benefits of e2e encryption. Having said that, it doesn't remove all of the benefits, and it's a (bad) precedent that has been set by other companies (eg. apple) where keys for end-to-end encrypted communication are backed up to the cloud.

The second problem is that Zoom has a second class of "client" called a "Connector" which runs in the cloud, and also has access to the keys for decrypting the stream. I definitely think that when one of these connectors is being used, it is false advertising to show the "e2e encrypted" status. However, there are clear technical reasons why these connectors are needed. Being able to dial into a meeting from an ordinary phone is important functionality that simply cannot support end-to-end encryption.

The interesting section to me is the later paragraph:

> For those who want additional control of their keys, an on-premise solution exists today for the entire meeting infrastructure, and a solution will be available later this year to allow organizations to leverage Zoom’s cloud infrastructure but host the key management system within their environment. Additionally, enterprise customers have the option to run certain versions of our connectors within their own data centers if they would like to manage the decryption and translation process themselves.

In particular, being able to use your own key management system would make this truly end-to-end encrypted by any definition, even if you are still using Zoom's cloud infrastructure.

hunter2_ · 6 years ago
> other companies (eg. apple) where keys for end-to-end encrypted communication are backed up to the cloud

Backed up for iCloud users who might not know any better, but not backed up for people who take the time to learn how to guarantee the full protection of E2E by keeping iCloud off. The fact that the full benefit is available with little effort, albeit not obvious, creates a contrast to how:

> Zoom has never built a mechanism to decrypt live meetings for lawful intercept purposes

...but they easily could. Users can't just search for how to harden the Zoom encryption to the point of lawful intercept becoming impossible and find a simple solution the way they can with Apple.

> an on-premise solution exists today for the entire meeting infrastructure

...is not practical for most.

So, eliminating the E2E badge was the right move. The fact that it was there until now is shady.

panarky · 6 years ago
It's not encrypted "end-to-end" if it can be decrypted between those two ends.
macrael · 6 years ago
they appear to have already changed this to "your client connection is encrypted"
hunter2_ · 6 years ago
That must have a hilarious commit message.
shrewduser · 6 years ago
which means fuck all.
true_religion · 6 years ago
They are using the same language as Apple talking about iMessage and FaceTime. Apple talks about end to end encryption, but one end is iCloud which is why you can get your messages simultaneously on all devices.
hn_throwaway_99 · 6 years ago
There is a big difference there though. In transit, iMessage and FaceTime backups are end-to-end encrypted, it's just the iMessage backups on iCloud that also store the key.

FaceTime chats, though, truly are end-to-end encrypted and the calls aren't backed up like iMessages are.

lxgr · 6 years ago
That's not true at all. iMessage is really end-to-end encrypted.

Two options impact it: "Messages in iCloud" re-encrypts and uploads messages to the user's iCloud account and stores the key in iCloud Keychain (also end-to-end encrypted).

Only when enabling iCloud backup will that key be revealed to Apple.

_-___________-_ · 6 years ago
It's entirely possible to do multi-device end-to-end encryption. See Signal or XMPP+OMEMO.
Ctd2xUvMAicg · 6 years ago
It says "connection is encrypted" in the current version. No mention of end-to-end whatsoever.
zeepzeep · 6 years ago
https://zoom.us/security still says "Secure a meeting with end-to-end encryption"

Dead Comment

gowld · 6 years ago
E2E changed meaning since, for example, HIPAA.
hunter2_ · 6 years ago
Can you elaborate slightly? This is interesting.
fulafel · 6 years ago
Nope.
m10i · 6 years ago
I’d like to know as well
Tuxer · 6 years ago
Apple does the same thing, where they claim iMessage is ETE encrypted, but the keys (so capabilities to read) are stored on their servers.
bananabreakfast · 6 years ago
This is not true. Don't spread FUD. Apple does not have the ability to read your messages. All messages stored on their servers are encrypted with keys that live only on the phone.

iMessage doesn't store your decryption keys on Apple's servers unless you opt into iCloud backup which is a whole different service and security concern.

dgcupps · 6 years ago
nilkn · 6 years ago
Zoom is such a bizarre product. For huge video calls, it tends to perform as well or better than everything else out there. Yet at the same time it literally seems like straight-up malware and seems to violate your trust and privacy left and right every step of the way, even in the installer (!).
allover · 6 years ago
To be fair it does perform better than everything else, which is why people are so forgiving of it, but it still doesn't excuse their ineptitude on privacy and security.
grahamburger · 6 years ago
In my experience Google's Hangout Meetings have been at least as good or better quality and the interface is far superior in my opinion. For example it works in the browser without any plugins (even in Firefox.)
tbrock · 6 years ago
Really? I think hangouts performs much better. Zoom performs like crap, why no hardware video encoding?
flattone · 6 years ago
Yeah. Security and privacy preclude performance. Like ... i dont need a Ferrari with an activated self destruct. ill take the camry, thanks.
holler · 6 years ago
better to ask forgiveness?
damanamathos · 6 years ago
It was one of the fastest-growing SAAS companies before coronavirus hit despite all the free competition.

The reason? "It just works."

It's clear their singular focus on making it "just work" for even the least tech-savvy users has led them to prioritise user experience over security/privacy. I imagine a rebalancing is coming.

fludlight · 6 years ago
Materially misrepresenting the product is not "prioritizing UX", it's lying to your customers.
bdamm · 6 years ago
Hopefully soon! A signal-like group video package that "just worked" with some processes for key verification would be outstanding.

Deleted Comment

epanchin · 6 years ago
Only the host needs an account though. For hangouts or FaceTime, everyone needs to sign up to Facebook or Google.
LatteLazy · 6 years ago
The age old question: is it bad because there are bad actors involved or is it bad because it's new and cheap and the maker views security etc as a Nice to Have.
saagarjha · 6 years ago
Ever used IDA Pro?
jsjddbbwj · 6 years ago
Please elaborate
_ph_ · 6 years ago
The problem with Zoom isn't, that it doesn't have end-to-end encryption. If you consider the problem, it is extremely difficult to solve, as in contrast to a 1:1 video call, the server somehow has to to multiplex the streams and thus at least some access to them. With a trustworthy provider, this isn't a big issue. A trustworthy provider will have a clear policy which ensures that only the multiplexer has access to the unencrypted data. After all, you are running a proprietary client from that provider, and each client of course has access to all unencrypted data.

The problem is, that the actions of Zoom doesn't make them look like a trustworthy provider. They lied about the end-to-end encryption. What they should have done instead is to be transparent on how unencrypted data is used on their servers and what their protocols are to prevent unauthorized access to that data. Which is especially important in a business context, because the business users themselves have confidentiality agreements, they need to guarantee and using an external provider for confidential data required that provider passing the neccessary scrutiny.

And of course, the huge pile of security issues coming up with their client, the web server, the mac installer, the script host, give any reason to believe that they either don't know what they are doing or completely reckless at least. And the term "reckless" doesn't fit in a conversation about security :).

mdavidn · 6 years ago
No. "End-to-end encryption" does not protect metadata necessary to route the data over a network, just the contents of the communication. The clients could negotiate keys to protect the contents of a meeting end-to-end. In other words, Zoom servers could deduce who was speaking, when they spoke, and for how long, but not what they said.

Your internet service provider can deduce the same about your HTTPS connections.

IshKebab · 6 years ago
> The clients could negotiate keys to protect the contents of a meeting end-to-end.

Not really because Zoom makes fairly extensive use of the decrypted video streams on their servers, e.g. to detect who is talking, pause video for people with slow connections, etc. You could maybe do it for meetings with a few people in, but good luck doing it for meetings with 100 people.

Hell the cryptography of group end-to-end encryption hasn't really been worked out yet. WhatsApp doesn't do it and that's just for text. I'm pretty sure Signal doesn't either.

There's really nothing bad with not having end-to-end encryption for group video conferencing apps. The shitty thing is that they pretended that they did.

Deleted Comment

_6fmb · 6 years ago
Zoom is sufficiently end-to-end encrypted for me. https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-...
fulafel · 6 years ago
The server does not have to decrypt or process the video, it can just send the same encrypted video to other clients (or you can use p2p communication without a server involved).

There may be advantages to processing video at the server, but it's definitely not a hard requirement.

_ph_ · 6 years ago
The problem is, that then you have to send all video streams to all client, that doesn't scale very well.
diebeforei485 · 6 years ago
FaceTime seems to do it well enough. It's limited to ~30 people per call though.
_ph_ · 6 years ago
The problem is the required bandwidth, if you send all streams to all participients. If you do that, you can do end-to-end encryption, but you have to send all streams at the maximum resolution you want to support. If the server handles the mixing, each client only needs to be send one full-resolution stream.
Seirdy · 6 years ago
Matrix/Riot, Jitsi, and Signal seem to have handled E2EE voice/video pretty well while being FOSS (the first of which is a free/open protocol as well as a client).
nojvek · 6 years ago
That's the right thing to do. If SpaceX is important to national security, then Zoom security and privacy is so bad, that a bad actor could steal SpaceX technology.

At my previous job, we used to dial in random zoom numbers and entered into random conversations of other companies. Once we landed into a Facebook call where they were talking about Libra (before it was a thing).

If you turn of camera and video, the host doesn't even know you're there unless they check guest list.

gnicholas · 6 years ago
Doesn’t it chime when someone enters?
chance_state · 6 years ago
Sure, but with a large enough call, legitimate users may come and go during the call too.
lttlrck · 6 years ago
It’s optional.
scotth · 6 years ago
I looked into adding Zoom to our Slack workspace this morning, and was beside myself with the set of permissions they requested — reading the contents of every channel and private chat they're included in? For a slash command?

That's a hard no. Turned me off the service entirely.

whateveracct · 6 years ago
> reading the contents of every channel and private chat they're included in? For a slash command?

This may improve soon. Slack is starting to force apps to request granular permissions (vs a big-tent "bot" scope like before) and when you submit to their store, they vet each permission and verify what you're using it for. They don't let you request permissions "just because" in my experience.

RandallBrown · 6 years ago
It's only available in the paid version, but slack's video conferencing works pretty well.
aidos · 6 years ago
It works, but it burns through so much CPU your computer will be a gibbering mess. There's some pretty silly inefficiencies going on, for example; if you switch away to another window, they display a small video player while keeping the big one running the background. Each time you switch into screen sharing mode, they drag you back to the app again. If you draw on the screen, someone has screwed up their linear algebra so you end up seeing double with an extra copy of what you're drawing, in totally the wrong place.

Annoyingly it's a bit too convenient, so going out of band is a pain.

paxys · 6 years ago
It works great for 1:1 and small group conversations, but its max meeting size (15 people I think) is an immediate disqualifier. We regularly have hundreds of people on Zoom calls with no issues.
dewey · 6 years ago
For me Slack's video conferencing never really worked that well. Even Google Meet worked better.
lostmyoldone · 6 years ago
YMMV, but for me ut turns my computer into a simulation of a space heater even when I'm not sharing my screen, and those gigantic unhidable toolbars makes me feel like I'm playing whack a mole more than working a times.

Oh, and yes,I "almost forgot" ! How to they even physically manage to get multiple seconds latency at times, when everyone in the call is in the same city, and where the worst connection on the call is at about 20Mbit? Are they just buffering for the heck of it, why not simply drop some frames if you get behind?

twic · 6 years ago
There's no video in the Android client, though (not sure about iOS). Zoom and Meet can both do that.
scotth · 6 years ago
Yeah, I saw that. Got pretty close to pushing the button on it after this episode, and probably will soon.

Dead Comment

kalvin · 6 years ago
We have Zoom on our Slack workspace and we'd remove it immediately if this were the case, but it appears to be false. The full list of permissions required by the official Zoom Slack integration is at www.slack.com/apps/A5GE9BMQC-zoom, and doesn't have read access to any channels, private or public, except for "some URLs in messages".
scotth · 6 years ago
Following your link brings me to the same list of permissions that I was talking about. Here are (some) of them:

* View some URLs in messages

* View messages and other content in public channels, private channels, direct messages, and group direct messages that Zoom has been added to

* View basic information about direct and group direct messages that Zoom has been added to

* View basic information about public channels in your workspace

* View basic information about private channels that Zoom has been added to

* View files shared in channels and conversations that Zoom has been added to

* View pinned content in channels and conversations that Zoom has been added to

* View messages and files that Zoom has starred

* View emoji reactions and their associated content in channels and conversations that Zoom has been added to

shirro · 6 years ago
I feel very conflicted on Zoom. It mostly just works and on every platform, even Linux. My kids use it to do their music lessons now. It really is very good at what it does in a time when such solutions are needed. Also they responded to the mobile facebook sdk issue and the macos issue quickly.

But I agree the way they suggest it is end to end encrypted is misleading. I don't think it really can be end to end to get the performance and features. People just need to see each other at the moment. You can do anything sensitive with more secure communication. But it clearly doesn't belong in any place discussing technology with military applications.

I still think it is solid for my kids to keep up with their lessons or for a weekly meeting about some web development. There are genuine criticisms of Zoom at the moment that need to be taken seriously but there is likely also some negative media being generated from their competition that are missing out.

simonh · 6 years ago
They did not address the OSX issue for ages. They claimed it was intentional and a valuable feature for customers. In the end Apple had to release a security update to remove the web server.
ramshorns · 6 years ago
So what's a good open source replacement? Jitsi, Jitsi Meet, Linphone, Ekiga, Jami and a bunch of others look okay [1], but it's hard to say how easy they are to use.

[1] https://en.wikipedia.org/wiki/Comparison_of_VoIP_software

Maakuth · 6 years ago
I've used Jitsi Meet with ordinary (that is, non-IT) people without trouble.I've also recommended it to elementary school teachers, who have been happy with it. It works with desktop browser, on mobile it offers a minimal app installation. Self-hosting is quite easy with their apt repo.
solarkraft · 6 years ago
I don't even know the other projects because I'm so satisfied with Jitsi. Everyone around me uses it and also seems pretty happy.
m0zg · 6 years ago
As they should, since they're subject to ITAR regulations, and ITAR is not a joke.
annoyingnoob · 6 years ago
Came to say the same thing. Zoom is impossible if you are considered part of the DoD supply chain. Most of the public products are untenable if you need to talk about ITAR projects or about anything considered CUI.
catalogia · 6 years ago
Even if they weren't supplying the DoD with anything, rocket technology is missile technology. (Granted, liquid fueled ICBMs are old-school, but they'd nevertheless still be under ITAR even if they took no government contracts.)

Deleted Comment