Saturday, May 4, 2024
Home Hacking News Zoom provide End-to-End Encryption for the free users : Report

Zoom provide End-to-End Encryption for the free users : Report

On Zoom announced on Wednesday that they had decided to provide end-to-end encryption for all customers, meaning the customers who are not using the paid version.

The company announced end-to-end encryption for the video and audio calls for every user and they decide for all the users

This time Zoom comes with the decision after engaging with the civil liberties organizations of CISO council.,child safety advocates and the new encryption experts that government representatives and the users.

Zoom released an updated version of End-to-End encryption(E2EE) design, the new design can be found on GitHub

Zoom provide End-to-End Encryption for the free users
Zoom provides End-to-End Encryption for the free users

When you enable us to offer E2EE as an advanced add-on feature for all the users around the globe -free and paid-it maintain the ability to prevent and fight abuse on our platform.

How to get the E2EE

Free/Basic users to be available E2EE phone number verification needs to be done and the user needs to provide the phone and verification secret code via text messages.

As per reports, it was mentioned that “ we are confident about the implementing risk-based authentication which combines with the current mix of tools and includes the report a user function that can prevent the fight abuse”.

From the starting of July 2020, the company planned to enable E2EE for free users.AES 256 GCM transport encryption will remain as the default encryption for all the users.

E2EE will remain an optional feature because it is limited to traditional functionalities which include traditional PSTN phone lines or SIP/H.323 hardware conference room systems.

The account administrator has the power or you say option that can enable and disable E2EE at the account and group level.

If you feel any suggestions for this article. Let me know in the comment section

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

1 COMMENT

  1. I couldn’t resist commenting. Exceptionally well written! I simply could
    not go away your website prior to suggesting that I actually loved the
    usual information a person supply to your visitors?
    Is gonna be again often to investigate cross-check new posts It’s perfect time to make some plans for the future and it is time
    to be happy. I have read this post and if I could I desire to suggest you
    some interesting things or advice. Maybe you can write next articles referring to this article.
    I want to read even more things about it! http://apple.com

    Look at my website Jimmy

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments