Zoom announced on Wednesday that they have decided to provide end-to-end encryption for all customers, not just paid users.
In late May, the company announced end-to-end encryption for video and audio calls, which is only available to paid users of its platform.
Now Zoom makes the decision after partnering with civil liberties organizations, our CISO council, child safety lawyers, encryption experts, government officials, and their users.
"We are also pleased to announce that we have found a way that reconciles the legitimate right of all users to privacy and the security of users on our platform."
Zoom has released an updated version of the E2EE design (end-to-end encryption). The new design can be found on GitHub.
"In this way, we can offer E2EE as an extended additional function for all users around the world – free of charge and for a fee – while at the same time maintaining the possibility of preventing and combating abuse on our platform."
Zoom's end-to-end encryption update – We found a way to make this feature available to all users (free and paid) around the world >> https://t.co/rjwCLYKDuJ⁰ <<
– Zoom (@zoom_us) June 17, 2020
How to use this E2EE
In order for Free / Basic users to be able to verify the E2EE phone number, they must provide the phone and verify the secret code by text message.
"We are confident that by implementing risk-based authentication in combination with our current tool mix – including our" report user "feature – we can continue to prevent and combat abuse," the report said.
As of July 2020, the company planned to activate E2EE for free users. The AES 256 GCM transport encryption remains the standard encryption for all Zoom users.
E2EE remains an optional feature because it restricts some traditional features “to include traditional PSTN phone lines or SIP / H.323 hardware conference room systems”.
Account administrators also have options to enable or disable E2EE at the account and group level.
You can follow us on Linkedin, Twitter, Facebook for daily cyber security and hacking news updates.
With the new zoom error, attackers can enter the systems of the participants via chat messages
Hackers use fake zoom installers to install Backdoor and Devil Shadow Botnet on Windows computers