Zoom, the popular-by-necessity video conferencing platform, has seen an explosion in users as the coronavirus pandemic forces people to work from home. In a recent blog post, CEO Eric S. Yuan said Zoom now has 200 million users, up from just 10 million last December.Â
But, with that increase in users has come greater scrutiny of Zoomâs privacy and security. With widespread reports of Zoombombing (where strangers dial in your channel with something rude and disruptive), the companyâs procedures have been called into question by the New York Attorney General, and prompted a class-action lawsuit.
The New Yorkâs Attorney General said he is âconcerned that Zoomâs existing security practices might not be sufficient to adapt to the recent and sudden surge in both the volume and sensitivity of data being passed through its network.â
Until recently, Zoomâs iPhone app included software that surreptitiously funneled user data to Facebook. The lawsuit says the code allowed Facebook to target users with ads. Â
Zoom has been criticized for ignoring privacy before. A year ago, a researcher found four million Zoom user cameras were potentially vulnerable to remote takeover without you knowing.Â
The company is currently pausing all feature development and âshifting all our engineering resources to focus on our biggest trust, safety and privacy issues,â Yuan said. But for many users, this isnât good enough. Theyâve already lost trust in Zoom and are searching for alternatives (which we identify below).Â
âDespite its ease of use, Zoom does not seem to take privacy seriously,â said Reuben Yap, Zcoin Project Steward. âDespite claims that Zoomâs video calls are [end-to-end] encrypted, this isnât actually the case. E2E encryption means that even Zoom should not be able to view the contents of the videos or calls.â
âInstead, all Zoom provides is transport encryption, meaning that it is secured to the extent that outsiders cannot intercept the call and view it. This still means that we have to trust Zoom to not read or leak this info. Given its track record, I donât have high hopes,â Yap said.Â
Yoav Degani, the founder of MyPrivacy, an app that bundles privacy protection tools such as a VPN and a password manager, said there are several privacy and security issues with Zoom. Because meetings can be recorded and uploaded to the cloud, which is not secured, people who are not on the meeting can get a recording (like your boss for example). Also, organizers can receive a text file with the transcript of the meeting chat.Â
âThereâs also a feature available to the meetingâs host called attendee attention tracking,â said Degani. âIt allows the host to monitor participantsâ computers and see if someone is not active in the Zoom call for more than 30 seconds.â
See also: How to Protect Your Online Privacy While Working From Home
You may not be officially active if, say, you put the Zoom window in the background and play some game or read some post on Facebook.
Degani said some bad guys are taking advantage of the situation and there are dozens of websites with the name âZoomâ that all of a sudden appear in search results and advertising and are used for phishing.Â
Several people who build and develop privacy-oriented tools recommend Jitsi as a more secure alternative to Zoom.Â
Emil Ivov, one of the founders of Jitsi, said what sets it apart from other video conferencing services is its low friction. Creating a meeting is as simple as typing your name in, and itâs just one click to join. The company uses WebRTC, or Web Realtime Communications, which enables peer-to-peer video, data and audio communication between two web browsers. So on desktops there are no downloads and no accounts needed, said Ivov.Â
âWe are really mindful about privacy and security,â said Ivov. âWe require no personal data and fully support anonymous use. We are also open source. This is where we are truly unique. If you have any concerns about how we run our service, then you can just go and run your own! It only takes 15 minutes.â
Being open source also means anyone can scrutinize its software. But Jitsi does not feature end-to-end encryption.Â
âFor now this is simply not possible with WebRTC, although the whole community is looking into the problem and we are hoping there will soon be solutions,â said Ivov. âFor the time being, however, all your data is encrypted in-flight using DTLS-SRTP [a protocol which adds encryption and ensures message authentication and integrity] as per the WebRTC standard. None of your media content leaves your computer unencrypted.â
Jitsi is one more secure alternative, and another includes Whereby. One big drawback: Users are limited to four meeting participants in the free version. The Pro version of Whereby is $9.99 per month, and allows up to 12 participants per room in up to three meeting rooms.
Other one-to-one alternatives include Facetime, which does have end-to-end encryption, as does Signal, the privacy-focused messaging and call app.Â
âProducts and services can be built to be both convenient and to protect privacy by design at the back-end,â says Raullen Chai, CEO of IoTeX, a Silicon Valley company that develops privacy-protecting smart devices. âThen you donât have to worry about whether or not you trust a centralized party because it is built in what can and canât happen with your data, returning control to the consumer. Blockchain-based key issuance allows for true end-to-end encryption without having to trust a central provider to not keep a key for themselves.â
Take all this into account, and itâs just one more indicator that yes, that meeting could probably be an email. As long as itâs one sent securely, that is.Â