/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

Felix

@c1truz_
2 posts
2020-04-04
Check out this blog post if you want to learn more about the technical background of the Zoom issue and its implications. Also, here is the full VMRay Analyzer report https://www.vmray.com/... ✌️ https://twitter.com/...
2020-04-04 View on X
TechCrunch

Zoom apologizes for routing some calls made in N. America through China, says it “mistakenly” allowed Chinese data centers to accept calls due to traffic spike

Hours after security researchers at Citizen Lab reported that some Zoom calls were routed through China …

Check out this blog post if you want to learn more about the technical background of the Zoom issue and its implications. Also, here is the full VMRay Analyzer report https://www.vmray.com/... ✌️ https://twitter.com/...
2020-04-04 View on X
The Intercept

Researchers: Zoom sometimes uses encryption keys issued by servers in China, uses a flawed encryption method, and hence is not suited to communicate secrets

but it can be fixed Stephen Warwick / iMore : Today on Zoom: ‘Not suited for secrets’, encryption issues and more Mercury News : Zoombombing: FBI warns video calls are getting hija...