Post Now
Image

The Videoconferencing platform Zoom announced the availability of the end-to-end encryption (E2EE) starting next week.

The Videoconferencing platform Zoom announced the availability of the end-to-end encryption (E2EE) starting next week.

Zoom announced end-to-end encryption as a technical preview, which means soliciting feedback from users for the first 30 days. Zoom users around the world both free and paid can host up to 200 participants in an E2EE meeting on Zoom with enhanced privacy and security for the sessions.

With E2EE, the meeting hosts can generate individual encryption keys and use them to protect voice or video calls from eavesdropping. The meeting hosts can use public-key cryptography to distribute these keys to other meeting participants.

The software will locally store the keys and will not share it with company servers. This design choice aims at ensuring that Zoom itself is not able to eavesdrop or communicate.

This green shield contains a lock if E2EE is active. If the lock is absent, Zoom will use its default AES 256-bit GCM encryption scheme, which the company uses to secure current communications.

Users that want to protect their communications with the E2EE have to update their clients and enable support for E2EE calls at the account level.

When E2EE is enabled, a green shield is shown on the top-left corner of all Zoom conferences.

"In Phase 1, all meeting participants must join from the Zoom desktop client, mobile app, or Zoom Rooms," Zoom said today.


“End-to-end encryption is another stride toward making Zoom the most secure communications platform in the world,” said Zoom CEO Eric S. Yuan. 

“This phase of our E2EE offering provides the same security as existing end-to-end-encrypted messaging platforms, but with the video quality and scale that has made Zoom the communications solution of choice for hundreds of millions of people and the world’s largest enterprises.”

For the latest cyber threats and the latest hacking news please follow us on FacebookLinkedin, and Twitter.

You may be interested in reading: How to Survive the COVID Time Cyber ​​Security Threats?