iTnews
  • Home
  • News
  • Technology
  • Security

Zoom to preview free end-to-end encryption for meetings

By Juha Saarinen on Oct 15, 2020 12:30PM
Zoom to preview free end-to-end encryption for meetings

Better security, but some features will be disabled.

Zoom will make its end-to-end encryption (E2EE) mode for video conferences publicly available as a technical preview starting next week, after first flagging the security enhancement in March this year.

The E2EE feature has to be enabled by desktop and mobile app users, and it is built around public cryptography utilising the popular Galois/Counter Mode (GCM) stream cipher operation which is considered high performance and secure.

Enabling E2EE means audio and video streams between Zoom apps will be encrypted with keys that are generated by the meeting host, and distributed to other participants.

This means only meeting participants have access to the encryption/decryption keys, and nobody else, not even Zoom, can intercept the traffic.

A green shield graphic with a padlock will appear when E2EE is enabled, and Zoom call participants can see the host's security code, comprising eight five-digit groups of security numbers for verification.

Currently, Zoom encrypts audio, video and application sharing for meetings and webinars with 256-bit Advanced Encryption Standard (AES) GCM using keys generated on the company's cloud servers. 

In the technical preview of E2EE, some meeting features will be disabled when the security feature is switched on.

Join before host, cloud recording, streaming, live transcription, breakout rooms, polling, one-on-one private chats and meeting reactions all stop working with E2EE enabled.

Single sign-on (SSO) integration with E2EE is tentatively on Zoom's roadmap for 2021 as well.

Zoom will require additional information from users wanting to enable E2EE such as verifying their phone numbers through text messages.

This is done to reduce the mass creation of abusive accounts, said Max Krohn, Zoom's head of security engineering.

The company, which claims to have 300 million daily meeting participants, has been criticised for poor security in the past, including the use of weak encryption keys that were distributed from servers in China where authorities could demand access to them from Zoom.

Zoom's E2EE announcement follows this week's statement from the Western Five-Eyes intelligence sharing alliance, and Japan and India, which demands that tech companies introduce backdoors in encrypted communications for lawful interception.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
encryptiongalois counter modesecurityzoom

Partner Content

Avoiding CAPEX by making on-premise IT more cloud-like
Promoted Content Avoiding CAPEX by making on-premise IT more cloud-like
Digital signatures propel Australian Unity with rapid time to value
Digital signatures propel Australian Unity with rapid time to value
Security: Understanding the fundamentals of governance, risk & compliance
Promoted Content Security: Understanding the fundamentals of governance, risk & compliance
The Great Resignation has intensified insider security threats
Promoted Content The Great Resignation has intensified insider security threats

Sponsored Whitepapers

Free eBook: Digital Transformation 101 – for banks
Free eBook: Digital Transformation 101 – for banks
Why financial services need to tackle their Middle Office
Why financial services need to tackle their Middle Office
Learn: The latest way to transfer files between customers
Learn: The latest way to transfer files between customers
Extracting the value of data using Unified Observability
Extracting the value of data using Unified Observability
Planning before the breach: You can’t protect what you can’t see
Planning before the breach: You can’t protect what you can’t see

Events

  • Forrester Technology & Innovation Asia Pacific 2022
By Juha Saarinen
Oct 15 2020
12:30PM
0 Comments

Related Articles

  • Post-quantum cryptography algorithms named
  • Google open sources data centre scale encryption
  • Researchers identify FIDO2 protocol vulnerabilities
  • Videoconferencing apps can access muted mics
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Services Australia sets changeover date for myGov

Services Australia sets changeover date for myGov

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NSW Police dumps Bezos-backed Mark43 from core systems overhaul

NBN Co proposes to axe CVC across all plans by mid-2026

NBN Co proposes to axe CVC across all plans by mid-2026

Google Cloud IoT Core goes on the end-of-life list

Google Cloud IoT Core goes on the end-of-life list

Digital Nation

Criteo to fork out $94.7m for consent breaches
Criteo to fork out $94.7m for consent breaches
Domino’s invests in observability for zero contact delivery
Domino’s invests in observability for zero contact delivery
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Australia will lose 11 percent of jobs to automation by 2040: Forrester
Metaverses on the agenda for Dominello, Husic ministerial meeting
Metaverses on the agenda for Dominello, Husic ministerial meeting
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
COVER STORY: How KPMG, Mirvac and ASX use blockchain to build trust in the property sector
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.