Last month, the video conferencing application Zoom announced that its acquisition of Keybase will enable it to provide end-to-end encryption. This means that those on the sending and receiving end of the Zoom video session will be able to escape the scrutiny of law enforcement personnel and hackers. But at the time, Zoom stated that only those who pay a premium service fee of $14.99 per month can use so-called E2EE (end-to-end encryption).
Zoom said that if the application is used to help carry
out illegal business and the FBI or other law enforcement agencies need to participate in the Zoom meeting to collect information, it can not provide E2EE to free users. A company spokesperson said at the time: “Zoom will not actively monitor the content of the meeting. Unless sexual abuse of children occurs, we will not share information with law enforcement. We plan to provide end-to-end encrypted identities for verifiable users, which
limits Harm to these vulnerable groups. Free users register with an email address that does not provide enough information to verify their identity.”
But today there is a blog post
Revealed that Zoom’s way of thinking has changed. The company wrote: “Today, Zoom released an updated E2EE design on GitHub. We are also happy to share with you that we have found a legal way to balance the privacy of all users and the safety of users on the platform. This will enable us Ability to provide E2EE as an advanced additional feature for all users (free and paid) worldwide, while maintaining the ability to prevent and combat abuse on our platform.”
Example of scaling a video conference
In order for this to work properly, free/basic Zoom users will have to perform a one-time process which includes verifying the phone number through text. Zoom said: “Many leading companies have performed similar steps in account creation to reduce the mass creation of abusive accounts. We believe that through the implementation of risk-based authentication, combined with the multiple tools we currently use (including reporting user functions) , We can continue to prevent and combat abuse.”