Zoom Video Communications has seen usage of its video conferencing service spike as a result of the coronavirus but a new report from The Intercept has shed light on the fact that its claim that its meetings have end-to-end encryption are not true.
On its website and in a security-related white paper, the US-based video conferencing company boasts about end-to-end encryption. However, The Intercept discovered that the service actually uses transport encryption instead.
Transport encryption is a Transport Layer Security (TLS) protocol which secures the connection between a user and the server they are connected to. TLS is also used to help secure connections between users and any website they visit with HTTPS protocol.
Make careless data decisions history with our dark web monitoring and alerts. Get Dashlane for seamless, private 'interneting' with 2FA (two-factor authentication) by default. Your privacy matters to us so that’s why there's no limit on devices or passwords stored or shared.VIEW DEAL ON Dashlane Premium
Zapped by Zoom? Here's 20% off Ringcentral Office
Integrated video conferencing, screen sharing and messaging for teams big and small. Get more done before, during, and after meetings with fully integrated messaging and a modern business phone system. Join Ringcentral Office and get the first month free, buy a phone and get another for free plus 20% off. This is a limited time offer.View Deal
- What is Zoom? How it works, tips and tricks and best alternatives
- SEC steps in to prevent investors from buying the wrong Zoom
- Concerned about Zoom security? Here's how using a VPN can keep you more secure
However, the main difference between transport encryption and end-to-end encryption is that while others won't be able to access your data, Zoom will still be able to.
In a statement to The Intercept, a Zoom spokesperson revealed that the service is unable to provide end-to-end encryption at the moment, saying:
“Currently, it is not possible to enable E2E encryption for Zoom video meetings. Zoom video meetings use a combination of TCP and UDP. TCP connections are made using TLS and UDP connections are encrypted with AES using a key negotiated over a TLS connection.”
Basically the company clarified that its use of the phrase “end-to-end” in its white paper is in reference to the connection being encrypted between Zoom endpoints. This means that other people can't access the data shared during Zoom video calls but the company itself still can.
Despite its recent surge in popularity, a number of privacy issues have come to light surrounding the service such as how its iOS app was found to be sending data to Facebook without explicit user consent. Thankfully Zoom recently removed the code that was sending data to the social network.
Additionally a new report from Bleeping Computer revealed that it is possible for hackers to steal passwords through Zoom's Windows client.
- We've also highlighted the best VPN services