/
Navigation
Chronicles
Browse all articles
Explore
Semantic exploration
Research
Entity momentum
Nexus
Correlations & relationships
Story Arc
Topic evolution
Drift Map
Semantic trajectory animation
Posts
Analysis & commentary
Pulse API
Tech news intelligence API
Browse
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
Concept Search
Semantic similarity search
High Impact Stories
Top coverage by position
Sentiment Analysis
Positive/negative coverage
Anomaly Detection
Unusual coverage patterns
Analysis
Rivalry Report
Compare two entities head-to-head
Semantic Pivots
Narrative discontinuities
Crisis Response
Event recovery patterns
Connected
Search: /
Command: ⌘K
Embeddings: large
TEXXR

Chronicles

The story behind the story

days · browse · Enter similar · o open

Zoom apologizes for security failures, says it has 200M+ DAUs vs. 10M in Dec., and plans to freeze development of new features to focus on security and privacy

Whether you are a global corporation that needs to maintain business continuity, a local government agency working to keep …

Zoom Blog Eric S. Yuan

Discussion

  • @dhh @dhh on x
    “While we never intended to deceive any of our customers, we recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it”, you don't say. I still am not clear what's up after reading this https://blog.zoom.us/..…
  • @iblametom Thomas Brewster on x
    New - Guess who spent over $1 million on Zoom tech in just a few days? CDC, FEMA and NIH. As in all the US gov bodies responding to the coronavirus crisis. This is where Zoom security and privacy needs to be much better. https://www.forbes.com/...
  • @dkthomp Derek Thompson on x
    Daily users before the pandemic: Skype: 23 million Zoom: 10 million Daily users after the pandemic: Skype: 40 million Zoom: 200 million https://twitter.com/...
  • @james_monaghan James Monaghan on x
    This is an appropriate response, and I love the @zoom_us product. But it is at least 100x harder to add security and privacy after the fact than building it in from the start. Should give everyone rapidly rolling out Covid19 response tech some pause. https://twitter.com/...
  • @joshgans Joshua Gans on x
    Zoom's ability to scale on this level is unprecedented. https://twitter.com/...
  • @nicolasmagand Nicolas Magand on x
    Pretty sure that if they were still at 10M DAUs, their repeated security failures would have made a lot of people switch to something else. Now with 200M+, it becomes harder to switch, as most of your contacts need to switch too. Security failures probably won't hurt them now. ht…
  • @ankit_a Ankit Agarwal on x
    Just when I thought it will very difficult for any company to beat the hockey stick growth of @uber but this is just bonkers and from an enterprise company at that https://twitter.com/...
  • @peterbotting Peter Botting on x
    Pretty cool, clear, transparent and fast communication here from @ericsyuan about security at @zoom_us and managing its recent phenomenal growth. 👏👏👏 https://twitter.com/...
  • @bdlesser Brian Lesser on x
    “However, we recognize that we have fallen short of the community's - and our own - privacy and security expectations. For that, I am deeply sorry, and I want to share what we are doing about it.” - Eric S. Yuan Founder and CEO, Zoom https://blog.zoom.us/...
  • @evan_greer Evan Greer on x
    This is pretty good, tbh. They've addressed a number of key concerns. Committing to a transparency report & ending the sketchy “attention tracking” thing is big BUT: they need to implement end to end encryption for all meetings. without that, the service will never truly be safe …
  • @johnwilander John Wilander on x
    Zoom: [We are] “Enacting a feature freeze, effectively immediately, and shifting all our engineering resources to focus on our biggest trust, safety, and privacy issues.” https://blog.zoom.us/...
  • @josephfcox Joseph Cox on x
    Zoom announces several changes, such as a “feature freeze” and moving all engineering resources to fixing privacy and security issues; enhancing its bug bounty program https://blog.zoom.us/... https://twitter.com/...
  • @matthew_d_green Matthew Green on x
    Zoom has published some details about their encryption practices. The claims are actually pretty good, though there are a few open questions. https://blog.zoom.us/... https://twitter.com/...
  • @danamodio Dan Amodio on x
    Worth noting that zoomAutenticationTool is a signed bin.. and you can use it as an auth trampoline for whatever script you want... https://twitter.com/... https://twitter.com/...
  • @patrickwardle Patrick Wardle on x
    Kudos to @zoom_us: https://blog.zoom.us/... In *one* day: ✅ “Released a fix for the UNC link issue” ✅ “Released fixes for both Mac-related issues” Promise to: ✅ Engage in pen-tests ✅ Improve bug bounty program ✅ Enact feature freeze to focus on safety/privacy issues 😇✌️ https://t…
  • @random_walker Arvind Narayanan on x
    Let's make this simple: Zoom is malware. https://twitter.com/...
  • @alyssabereznak Alyssa Bereznak on x
    been using zoom a lot more recently? sooo yeaaaah, here's the thing about that: https://www.wired.com/...
  • @wired @wired on x
    As many people's professional and social lives move online, Zoom use has exploded. But with this boom has come added scrutiny from security researchers—and they keep finding more problems, including two fresh zero day vulnerabilities revealed this morning. https://www.wired.com/.…
  • @ashk4n Ashkan Soltani on x
    This is pretty ironic coming from a guy that once spied on a reporter who wrote a bad review about him... #privacy https://www.reuters.com/...
  • @camillard Camilla Blackett on x
    For the last time - Zoom is FEDS. If you want to have a mtg with me we can FaceTime or call. Remove this shit from your devices. https://twitter.com/...
  • @nxthompson Nicholas Thompson on x
    Ease of use and security + privacy are often in tension. Zoom has always chosen the first—which is partly why it's grown fast and why it's getting hammered now. https://www.wired.com/...
  • @troyhunt Troy Hunt on x
    On the one hand, I'm reticent to criticise a service bringing people together in such a difficult time. On the other hand, holy shit! “Ex-NSA hacker finds new Zoom flaws to takeover Macs again, including webcam, mic, and root access” https://9to5mac.com/...
  • @ericgeller Eric Geller on x
    Not good, folks. https://twitter.com/...
  • @_xpn_ Adam Chester on x
    ... as long as they already have access to the victims device! Quite an important distinction. It's a local privesc and a local Apple TCC (privacy) bypass! Nice research as always by the original author, but this Zoom press hype is getting daft. https://twitter.com/...
  • @kimzetter Kim Zetter on x
    Contrarian view: Zoom will soon be the most secure conferencing tool out there. (But too bad they didn't save themselves some grief and engage in some security assessments of their own to avoid this trial by fire) https://twitter.com/...
  • @somospostpc Alex Barredo on x
    A few years ago, this happened with Slack. I remember a story about a guy that faked an apple dot com email address and got to see all the rooms and channels inside the company https://www.vice.com/...
  • @_g0dmode Mitch on x
    #Zoom chat allows you to post links such as \\x.x.x.x\xyz to attempt to capture Net-NTLM hashes if clicked by other users.
  • @hackerfantastic Hacker Fantastic on x
    Hi @zoom_us & @NCSC - here is an example of exploiting the Zoom Windows client using UNC path injection to expose credentials for use in SMBRelay attacks. The screen shot below shows an example UNC path link and the credentials being exposed (redacted). https://twitter.com/...
  • @nytimesbusiness @nytimesbusiness on x
    Zoom, the videoconferencing app, said today that it would turn off a data-mining feature that could be used to snoop on meeting participants after inquiries from The Times https://www.nytimes.com/...
  • @nytimes @nytimes on x
    Until today, a feature on Zoom allowed some participants to access LinkedIn profile data about other users — without Zoom asking for their permission or even notifying them that someone else was snooping on them https://www.nytimes.com/...
  • @jeffbigham Rogue P. Bigham on x
    there's a lesson here... not sure what that lesson is yet, but there's a lesson — “Privacy experts said the company seemed to value ease of use ... over instituting default user protections.” https://www.nytimes.com/...
  • @troyhunt Troy Hunt on x
    The good news is that flaw only impacts Mac users. The bad news is that this one impacts PC users: https://arstechnica.com/...
  • @mikeelgan Mike Elgan on x
    Why is everyone using Zoom? Why is anyone using Zoom? https://twitter.com/...
  • @0xamit Amit Serper on x
    1. Link has to be clicked 2. Meeting has to be public for someone malicious to even join and post the link (which should probably be your in threat model anyhow) 3. This is how windows explorer works, it's vulnerable as well Conclusion: Stop using windows. #IHaveOpinions https://…
  • @reckless Nilay Patel on x
    The biggest question facing Zoom is whether these gaffes are move-fast-break-things mistakes, or reflective of a deeper culture of disrespect for user privacy. Or... both. https://www.theverge.com/...