Zoomed in at the waist, the video conferencing service will soon not only encrypt video calls from paying users, the company promises to make end-to-end encryption available in its free design. they go back to the beginning of the year. The company already advertised the service as using end-to-end encryption – but it quickly became clear that this was not the case, and the company was using TCP and UDP protocols to protect conversations. So even if there was encryption, a significant difference from end-to-end solutions was that Zoom itself still had access to video call material. The company defended itself when it talked about end-to-end encryption, when it actually meant encryption between “Zoom endpoints” – and also considered its own servers to be such endpoints.
the shaky legs of a highly skewed explanation, of course, didn’t last long, so the company first honed its communications and finally announced it would soon actually make end-to-end encryption available in its product, albeit only for paying customers. Originally, the company has firmly refrained from this kind of protection for free users ’communications, arguing that authorities are trying to make things easier for users who find illegal content because they typically don’t use a Zoom profile, which also makes it harder to track them. Encryption is also provided for free calls, but it is not end-to-end encryption, but only previously available data, so the company itself can still access the conversation material on its own servers.
The company has been widely criticized for the decision. that Zoom would turn personal data protection into a paid, premium feature – which would otherwise be available everywhere by default. Zoom finally broke under pressure and announced this week that it will soon make end-to-end encryption available to everyone, whether paid or free – but the latter will also collect extra data to use the feature to prevent mass abuse of the service. . This could be the phone number of the users to whom the company will send a confirmation code before using the service. What other options will be available for authentication have not been talked about by the company yet.
The end-to-end encryption beta is scheduled to begin in July this year. By default, the service will continue to use encryption during data transmission, users will be able to turn on the end-to-end solution manually – but this will involve some sacrifices, and it will not be possible to join protected conversations from a traditional telephone line or SIP / H.323 conference systems. . This function can be controlled at the group level by administrators.
Gellert is Technology Editor at Counting News Media and contributor at other major tech publications. Her interests includes testing new gadgets and reading.