computer Security

Zoom Suddenly Announced End-to-End Encryption for Free Users

Zoom has announced that it will now provide End-to-End Encryption for free to all its users. And Zoom has announced this news on Wednesday that they will provide a reverse course.

Zoom hit with several vulnerabilities recently that opens to various attacks against virtual Zoom meetings, in results Over 500,000 Zoom Accounts Sold By Hackers On Dark Web Forums.

To find a better solution, Zoom Team goes complete End-to-End encryption to enhance the security for its customers.

We all are now connected with the help of the video conferencing apps like Zoom, Skype, WhatsApp, and much more, due to this severe COVID-19 pandemic that has spread all over the world, people are pursuing work from home, and Zoom is one of the apps that is helping throughout this whole situation. 

Earlier, Zoom said that they would provide a gold standard of encryption that would only be available for paid users of its platform. But, now the company faces much criticism, as several users stated that they are asking the user to pay extra for additional features and services.

End-to-End Encryption for Free Users

Zoom released this feature on May 22, and they asserted that they took feedback from civil liberties organizations, their CISO council, child safety advocates, encryption experts, government representatives, their users, and many other stream users as well. 

Moreover, the CEO of the company, Eric Yuan, clarified that they had investigated new technologies to allow them to offer E2EE to all tiers of users. And after that, they released this feature of End-to-End encryption on the Github.

More importantly, the company declared that they had identified a path ahead that matches the legitimate right of all users to secrecy and the security of users on their platform. This implies that they will ultimately save the data of every user. 

This process will allow them to offer E2EE as an advanced add-on feature for all the users throughout the world; whether they are free and paid users, everyone will get access to this new feature. 

This new feature will engage users in a one-time method that will help the user for extra information, for example, verifying a phone number through a text message. Well, all these are there in the new feature, that will be accessible for every Zoom user.

New Feature Might Not Be as Good as It Sounds

Now many of you might be thinking that why we are uttering like this? As we all know that nowadays, nothing comes for free, and for this new feature, Zoom wants that every user should give their personal information to them. 

As one of the privacy experts, Pat Walshe clarified that how they will assure that there will be no crime or the personal data of the users will not be misused.

The expert also claimed that how do they claim that this is the solution of the problem, as there are various chances of crimes like they can use any anonymous SIM to get control over the data on online. 

Moreover, the main thing that distracted the expert is that Zoom released this new feature in the GitHub, whereas Zoom is equally capable of releasing this kind of encryption.

In short, after releasing the End-to-End Encryption feature for every user, the concerns remain constant, whether it can safe the file correctly or whether they prevent child exploitation and other misuses of its platform.

Apart from this, Zoom is constantly trying to get all the trust of users by providing some attempt to secure alternative. And they also mentioned that they would release some other measures that can be brought into play that do not need users’ privacy and personal data. 

This would take a few months to bring those features, but before that, users have to believe this and enjoy the E2EE functionality offered by the company for free.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji N

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

30+ Tesla Cars Hacked Using Third-Party Software

A security researcher identified a vulnerability in TeslaLogger, a third-party software used to collect data…

1 day ago

How to Use Threat Intelligence Feeds for SOC/DFIR Teams

Threat intelligence feeds provide real-time updates on indicators of compromise (IOCs), such as malicious IPs…

1 day ago

YARA-X, The Malware Researchers Toolbox Evolved

Malware experts all over the world can't do their jobs without YARA. YARA has been…

1 day ago

SugarGh0st RAT Attacking Organizations & Individuals in AI Research

The cybersecurity company Proofpoint has found a new operation using the SugarGh0st Remote Access Trojan…

1 day ago

New Cyber Attack Targeting Facebook Business Accounts

The email campaign impersonates the Facebook Ads Team to trick users into clicking a malicious…

1 day ago

CISA Reveals Guidance For Implementation of Encrypted DNS Protocols

"Encrypted DNS Implementation Guidance," a detailed document from the Cybersecurity and Infrastructure Security Agency (CISA),…

1 day ago