Zoom Privacy and Security Issues You Should Know About
About a year ago, I was introduced to Zoom by friends who wanted to have a video conference. It took me about ten minutes to decide to forget about Zoom forever. First, Zoom is not open-source software, and second, their privacy policy stated that they collect tons of information about their users. I suggested an ethical open-source alternative (which Iâll mention below), and we managed without Zoom.
With the onset of the global quarantine, everyone suddenly started using Zoom for video conferences, even heads of state. Zoom + Windows OS = facepalm, and then people are surprised when hackers get hold of important government information. For example, the UK Prime Minister was seen having a good time on Zoom (even revealing the meeting ID) with some officials. There are plenty of similar posts on social media where politicians hold their meetings via Zoom.
I used to think that when politicians from different countries held video conferences, some super-admins would set up a highly encrypted communication channel with special software not available to the public. But now, everyone just uses Zoom.
Zoom has faced a massive influx of new users as the COVID-19 outbreak forces more people to work from home. However, new users should be aware of the companyâs privacy and security practices. A quick look at their privacy policy and supporting documents reveals that Zoom tracks your presence during calls, shares large amounts of data with third parties, and has serious security vulnerabilities.
1) Zoom Knows If Youâre Paying Attention
Whenever you join a call, thereâs an option to enable the attention tracking feature. This notifies the call organizer whenever someone in the meeting does not have the Zoom desktop or mobile app in focus for more than 30 seconds. In other words, if you minimize Zoom or switch to another app, the organizer will be notified after 30 seconds, regardless of whether youâre taking notes, checking email, or answering a question elsewhere.
This feature only works if someone is sharing their screen. Itâs unclear if participants are notified when attention tracking is enabled. Of course, not looking at the Zoom screen doesnât mean youâre not paying attention or doing your job. The feature only works on Zoom apps version 4.0 or later and is less reliable if you use Zoom through a web browser.
Also, if the organizer decides to record the meeting, Zoom will save a TXT file of the chat messages and share it with the meeting host. According to their support page, âthe saved chat will only include messages sent to everyone.â However, itâs not clear what happens to direct messages between participants.
2) Zoom Tracks More Than Just Your Attention
According to Zoomâs privacy policy, the company collects a lot of data about you, including:
- Your name
- Physical address
- Email address
- Phone number
- Job title
- Your employer
Even if you donât create a Zoom account, it collects and stores data about your device and IP address. It also gathers information from your FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More profile (if you use FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More to log in) and any âinformation you upload, provide, or create while using the service.â
Some of this data is entered by you (for example, your email to join a call), but most is collected automatically by the Zoom app. In their privacy policy, under âDoes Zoom sell personal data?â, they say: âIt depends on what you mean by âsellâ.â In summary, Zoom claims not to sell personal data for money to third parties, but they do share it with third parties for those companiesâ âbusiness purposes.â For example, they may share your data with Google.
A Vice article noted that the Zoom iOS app shared significant user data with FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More, even if the user didnât have a FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More account. Two days after the article was published, Zoom removed the code that sent data to FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More. Zoom explained that they were unaware the FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More SDK used for âLogin with FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. Moreâ was collecting unnecessary data. The data collected included device type and version, time zone, OS, model, carrier, screen size, processor cores, and disk space.
Currently, Zoom faces a class-action lawsuit from a California resident who claims Zoom violated the California Consumer Privacy Act by sharing user data with FacebookFacebook launched an official Tor mirror in 2014, becoming the first major tech company to provide direct access through onion routing. The mirror allows users to bypass censorship, secure their connections, and avoid phishing risks while using the platform. This step also underscored Facebookâs recognition of free expression and inspired other outlets like the BBC and ProPublica to create their own Tor versions. More without consent. The New York Attorney General also sent a letter to Zoom expressing concern that their security practices may not protect user data, especially for students, as Zoom recently increased the number of free participants to help schools teach remotely.
3) Zoom Does Not Use True End-to-End Encryption
Zoom has used its own definition of end-to-end encryption (E2EE), which can mislead users. Despite claims on their website and in their security documentation that âcomputer audioâ calls are end-to-end encrypted, analysis shows that Zoom only uses transport layer security (TLS)âthe same encryption that protects websites using HTTPS.
TLS encryption protects internet connections from third-party eavesdropping, but it does not protect data from Zoom itself. This is different from true E2EE services like ProtonMailProtonMail, launched in 2014 by scientists from CERN and MIT, is one of the worldâs most trusted encrypted email services. Built under Swiss privacy laws, it offers end-to-end encrypted email, calendar, cloud storage, and VPN as part of the broader Proton ecosystem. With features like self-destructing messages and password-protected emails, Proton ensures users keep full control of their data. Guided by the principle âYour data, your rules,â Proton has become a global symbol of digital privacy and security. More, where messages are encrypted on the userâs device and can only be decrypted by the recipient. No one else can access the unencrypted data between users.
A Zoom spokesperson clarified that E2EE for Zoom means âthe connection is encrypted from the Zoom endpoint to the Zoom endpoint,â but here, âendpointâ refers to Zoomâs server, not the userâs app. This does not meet the standards of true end-to-end encryption.
4) Zoombombing
Online trolls have disrupted many Zoom meetings by sharing offensive or pornographic material using the Screen Share featureâa phenomenon known as âZoombombing.â By default, Zoom allows any participant to share their screen without the hostâs permission. If a call is public, anyone with the link can join, making it easy for attackers to hijack meetings and display inappropriate content.
5) Webcam Hacking Issue
Last year, security consultant Johnathan Leitschuh discovered that Zoom installed a local web server on Mac computers, allowing Zoom to bypass Safari 12âs security features. This web server was not mentioned in any official Zoom documentation and was used to bypass the pop-up that appeared before enabling the camera.
This remote web server was not properly secured and could be accessed by any website, allowing malicious sites to take over the Macâs camera without warning the user. This led the Electronic Privacy Information Center to file a complaint with the FTC, claiming that Zoom âintentionally designed its web conferencing service to bypass browser security settings and remotely enable a userâs web camera without the userâs knowledge or consent.â
Although Zoom has since removed these web servers, their disregard for user consent and ongoing neglect of security and privacy in favor of convenience raises serious concerns.
Key Generation in China
According to researchers at the University of Toronto, some Zoom video conferences are encrypted using keys issued by servers in China, even when all participants are in North America. Zoom also reportedly has at least 700 employees in China across three subsidiaries.
A report by Citizen Lab states that Zoom âis not suitable for useâ and is legally required to disclose encryption keys to Chinese authorities and ârespond to pressureâ from them.
When you start a Zoom meeting, the software on your device receives an encryption key from Zoomâs cloud infrastructure, which includes servers worldwide. The key comes from a âkey management systemâ that generates and distributes encryption keys to meeting participants. Each user receives the same shared key, which is sent to their device via TLS encryption.
Depending on the meeting setup, some Zoom cloud servers called âconnectorsâ may also receive a copy of the key. For example, if someone joins by phone, the key is sent to a Zoom telephony connector server.
Some key management systems (5 out of 73) appear to be located in China, with the rest in the US. During a test call between two Citizen Lab researchers in the US and Canada, the meetingâs encryption key âwas sent to one participant via TLS from a Zoom server apparently located in Beijing.â
The report notes that Zoom may be legally required to provide encryption keys to Chinese authorities if those keys are generated on a server in China. If Chinese authorities or any other attacker with access to the key want to spy on a Zoom meeting, they would also need to control the participantâs internet access or monitor Zoomâs internal network. By collecting the encrypted meeting traffic, they could use the key to decrypt and recover the video and audio.
What Does Zoom Say?
Zoomâs CEO has expressed regret about these privacy and security issues. In a recent blog post, he said Zoom usage has grown by 1,900%, reaching about 200 million daily users, up from 10 million per day in December 2019.
Notable Incidents
- A Norwegian school stopped using Zoom after a naked man âguessedâ the conference link.
- Elon Muskâs SpaceX banned Zoom.
What Should You Use Instead?
If you work for a company, consider suggesting a self-hosted solution to your administrators, such as:
For personal use:
- Jami
- You can also use Jitsi, but be aware that WebRTC (for now) does not provide a way to conduct multi-party calls with end-to-end encryption. Your traffic is encrypted on the network but decrypted on the bridge server when using Jitsi Meet.
The architecture of Jitsi Meet allows you to deploy your own version, including all server components. In this case, your security is roughly equivalent to a direct one-on-one WebRTC call, which is a unique security advantage of Jitsi Meet.
Official servers from the Jitsi team (check their privacy policy):
A list of Jitsi servers run by various organizations, communities, and enthusiasts (check their privacy policy and research who runs the server before use):
Stay safe and make informed choices about your video conferencing tools.