We have several more weeks, if not several more months, to go in this sudden era of Everything from Home. Work from home, school from home, funerals from home, church from home, happy hour from home—you name it, and we as a society are trying as best as we can to pull it off remotely. Tech use as a result is up all over, but arguably the biggest winner to date of the "Oh, crap, where's my webcam" age is videoconferencing platform Zoom.
Zoom's ease of use, feature base, and free service tier have made it a go-to resource not only for all those office meetings that used to happen in conference rooms but also for teachers, religious services, and even governments. The widespread use, in turn, is shining a bright spotlight on Zoom's privacy and data-collection practices, which apparently leave much to be desired.
The challenge is particularly pronounced in the health care and education sectors: Zoom does offer specific enterprise-level packages—Zoom for Education and Zoom for Healthcare—that have compliance with privacy law (FERPA and HIPAA, respectively) baked in. Many users in those fields, however, may be on the free tier or using individual or other types of enterprise licenses that don't take these particular needs into consideration.
Growing (privacy) pains
Amid the scrutiny, Zoom this week made some changes to that policy. "Zoom does not sell customer content to anyone or use it for any advertising purposes," the company now says in bold, italic lettering—a welcome change, to be sure.
Following the report, Zoom updated the app on Friday to cut off the feature, saying, "We originally implemented the 'Login with Facebook' feature using the Facebook SDK in order to provide our users with another convenient way to access our platform. However, we were recently made aware that the Facebook SDK was collecting unnecessary device data."
The company is still facing a lawsuit from a plaintiff in California, however. The suit (PDF), which seeks class-action status, alleges that Zoom violated the California Consumer Privacy Act (CCPA), which went into effect on January 1, arguing Zoom "failed to properly safeguard the personal information of the increasing millions of users of its software application."
Worse, a feature meant to streamline connection for corporate users seems to be leaking some Zoom users' personal contact information. A report today, also by Vice Motherboard, found that users who sign up from the same email domain are automatically being added to each others' contact lists. For a workplace scenario, this makes sense: if two users both sign up using @arstechnica.com email addresses, odds are we work for the same employer and would need to talk to each other for work purposes. Businesses' contacts get populated into Zoom this way regularly.
Users signing up with personal email addresses, however, are also having their information shared with other users of the same domain. One user shared with Motherboard a screenshot showing almost 1,000 other users—all strangers to him—listed in a "company directory." Some widely used domains, including gmail.com, yahoo.com, and hotmail.com, are excluded from the company directory. Smaller domains used by individuals, though, appear not to be on the exclusion list.
Zoom promises a bevy of protections for hosts who create meetings. At the top of that list is a promise that users can "secure a meeting with end-to-end encryption." That sounds pretty great! Unfortunately, it also might not be exactly true.
A report published today by The Intercept finds that the claim might be misleading. Instead of end-to-end encryption for audio and video, Zoom offers something slightly different, called transport encryption.
When ThRead More – Source