As we have noted in past posts, Zoom has become the default app for use in online education and meetings, not only at UC but throughout higher ed. Yet there is a continuing flow of concerns and examples of "Zoombombing" being reported, including at UCLA. Here is a further analysis:
‘Zoom is malware’: why experts worry about the video conferencing platform: The company has seen a 535% rise in daily traffic in the past month, but security researchers say the app is a ‘privacy disaster’
Kari Paul, 2 Apr 2020, The Guardian
As coronavirus lockdowns have moved many in-person activities online, the use of the video-conferencing platform Zoom has quickly escalated. So, too, have concerns about its security. In the last month, there was a 535% rise in daily traffic to the Zoom.us download page, according to an analysis from the analytics firm SimilarWeb. Its app for iPhone has been the most downloaded app in the country for weeks, according to the mobile app market research firm Sensor Tower. Even politicians and other high-profile figures, including the British prime minister, Boris Johnson, and the former US federal reserve chair Alan Greenspan, use it for conferencing as they work from home.
But security researchers have called Zoom “a privacy disaster” and “fundamentally corrupt” as allegations of the company mishandling user data snowball. On Monday, New York’s attorney general, Letitia James, sent a letter to the company asking it to outline the measures it had taken to address security concerns and accommodate the rise in users. In the letter, James said Zoom had been slow to address security vulnerabilities “that could enable malicious third parties to, among other things, gain surreptitious access to consumer webcams”.
A spokesman from Zoom told the Guardian on Wednesday it was planning to send James the requested information and comply with the request. “Zoom takes its users’ privacy, security, and trust extremely seriously,” the spokesman said. “During the Covid-19 pandemic, we are working around the clock to ensure that hospitals, universities, schools and other businesses across the world can stay connected and operational.”
And on Thursday, the company announced it would freeze all new feature development and shift all engineering resources on to security and safety issues that have been called to attention in recent weeks. Here’s what you need to know about the challenges with Zoom:
‘Zoom bombing’ on the rise
On 30 March, the FBI announced it was investigating increased cases of video hijacking, also known as “Zoom-bombing”, in which hackers infiltrate video meetings, often shouting racial slurs or threats. Zoom meetings can be accessed by a short number-based URL, which can easily be generated and guessed by hackers, a January report from the security firm Checkpoint found. Zoom has released guidelines in recent days about how to prevent unwanted guests from crashing video meetings and a spokesman told the Guardian it had also been working to educate its users on protections through blogposts and webinars.
No end-to-end encryption
Zoom has falsely advertised itself as using end-to-end encryption, a system that secures communication so that it can only be read by the users involved, a report from the Intercept found. Zoom confirmed in a blogpost on Wednesday that end-to-end encryption was not currently possible on the platform and apologized for the “confusion” it caused by “incorrectly” suggesting the opposite.
Security flaws
A number of security flaws affecting Zoom have been reported in the past and as recently as this week. In 2009, it was revealed Zoom had quietly installed a hidden web server on user devices that could allow the user to be added to a call without their permission. And a bug discovered this week would enable hackers to take over a Zoom user’s Mac, including tapping into the webcam and hacking the microphone. The company said on Thursday it had issued a release to fix the Mac issue, but the number of security issues with Zoom in the past make it as bad as malicious software, said Arvind Narayanan, an associate computer science professor at Princeton University. “Let’s make this simple,” he said. “Zoom is malware.”
In-app surveillance measures
Zoom has been criticized for its “attention tracking” feature, which allows a host to see if a user clicks away from a Zoom window for 30 seconds or more. This feature would allow employers to check if employees are really tuned into a work meeting or if students are really watching a classroom presentation remotely.
Selling user data
A report from Motherboard found Zoom sends data from users of its iOS app to Facebook for advertising purposes, even if the user does not have a Facebook account. Zoom changed some of its policies in response and said on Thursday that the company “has never sold user data in the past and has no intention of selling users’ data going forward.” But the Motherboard story was cited in a lawsuit filed in a federal court in California this week, accusing Zoom of failing to “properly safeguard the personal information of the increasing millions of users” on its platform.
This privacy flaw was also mentioned in the letter from James, which noted such privacy violations could be of particular concern as schools migrate to Zoom for class. “While Zoom has remediated specific reported security vulnerabilities, we would like to understand whether Zoom has undertaken a broader review of its security practices,” the letter said.
Source: https://www.theguardian.com/technology/2020/apr/02/zoom-technology-security-coronavirus-video-conferencing
No comments:
Post a Comment