Trending

Zoom acquired Keybase with plan to provide End-to-End Encryption

Video conferencing has been one of the ways for conducting meetings earlier, but now the times have changed. As the COVID 19 lockdown has pushed people into staying indoors and people have been asked to work from home. The work from home conditions have made meetings go virtual and people have started using video conferencing apps as a tool to keep their works on track. But, these apps require access to a lot of apps in our system and they have the responsibility to safeguard the user’s information. Zoom is a large enterprise and widely used at present. Thus, as a step towards giving users a secured experience Zoom Video Conferencing has acquired Keybase. Zoom has an encryption system now but it needs improvement to provide end-to-end encryption in the near future.

Cyble, a cybersecurity intelligence firm (amibreached.com) told portals that it has been finding free Zoom accounts being posted on hacker forums for popularity. After finding accounts being posted in bulk, the company went ahead and bought the accounts to caution their customers. Cyble was able to purchase approximately 530,000 Zoom credentials for less than a penny per account. This brought humongous criticism to the Zoom.

Keybase joins Zoom

Keybase is a company that works to provide end-to-end encryption.It is a key directory that maps socialmedia identities to encryption keys in a publicly-auditable manner. It is one of the encryption products used by companies. Keybase is an encrypted social-networking service provider, currently owned by Zoom Video Communications. It was created by Chris Come, Max Krohn, and their team. The network currently enjoys some 400k users.

The programming languages used to write the keybase software are Go, Javascript, Electron, and React. The firm was launched on 14 February 2014.

On May 7, 2020, Zoom officially acquired Keybase as part of Zoom’s drive to keep their information secure and safe and to introduce an end-to-end encrypted meeting mode.

Zoom to allow disable PMI option

PMI or Personal meeting Ids are automatically assigned to the user once he signs up and a personal meeting room is created. This PMI is a part of the URL that we possess. Now, this can be a threat to one’s privacy as anyone can join a particular meeting if they have the link as the PMI remains the same. 

Therefore, Zoom has now launched a new feature using which users can disable their PMI. Disabling the PMI solves the problem immediately. This option is available at an individual as well as a group level.

Once the PMI gets disabled users are prompted with a message that “PMI is disabled” who have been accessing it. All the previous meetings scheduled will be invalid and have to be rescheduled or updated. The user needs to delete any meeting scheduled using the PMI, schedule a new one, and send out new invitations, and keys are distributed to the participants.

No new change is acquired by the scheduling of the meeting but just now there won’t be any particular ID but a randomly generated ID. Also, there is no personal meeting room. 

This option helps companies and meeting organizers that want extreme security and do not want to take any chances in compromising with security. These are designed to satisfy customers who prefer security over compatibility. But,  people who wish to use the personal links are also provided with features to be secure. All meetings can be secured by these features: require a password to join meeting, enable waiting room, require only authenticated people to join, disable join feature before host, lock the zoom meeting once started, and mute/unmute participants.

Zoom Encryption now and in the future

Zoom is used by 300 million users daily on an average. The teaming up of Zoom and Keybase is to provide security to the users. Zoom is planning to achieve it by a 90-day end to end encryption plan.

The message sent is encrypted at client and server each side. It is not decrypted until it reaches to the end user’s device. With the recent Zoom v5.0 release, Zoom client now supports content enccryption using industry-standard AES-GCM with 256 bit keys, as proposed by the zoom.

Zoom has been working on developing end-to-end encryption for video conferences since it was severely criticized for incorrectly making its calls appear to be fully encrypted. In the near future, Zoom’s all paid users have been provided with an end to end encryption facility. People hosting meetings will be given temporary IDs and they are required to share it through invitations. These are cryptographic identities.

Zoom Encryption Support

These encrypted meetings do not support phone bridges, non-zoom room conferencing, or cloud recordings. The encryption is completely done by the hosts. The company aims at providing privacy as well as to protect its users from any possible harm. They have proposed a set of steps that they are going to take further to ensure this. There will be reporting mechanisms available for the hosts to remove attendees they desire to. They won’t be monitoring everything in the meeting but the security team would be having some automated tools to find and catch abusive users. Live meetings will not be decrypted. No employee from the team will be able to join any meetings. A more detailed cryptographic design draft is expected to be published by the company.

Read Next: Encryption – Definition, Keys, Algorithms and Many more…

Encrypt Team

Recent Posts

Cybersecurity For Small Businesses On A Budget

Did you know that more than 46% of cyberattacks are directed at companies with fewer than 1000…

7 months ago

Importance Of Regular Software Updates In Cyber Security

Digitalization has both pros and cons. However, one of the major disadvantages that each of…

7 months ago

Five Machine Learning Types to Know

The concept of machine learning is completely changing the world and revolutionizing various sectors. But…

8 months ago

Cyber Fraud Vs Cybersecurity: Defending Online Threats

Did you know that in the year 2023, around 353 million faced digital breaches that could potentially…

8 months ago

Google’s Real-Time URL Protection For Chrome Users

How safe is your internet browsing experience? In a world where cyberattacks have become common,…

8 months ago

How Do We Prioritize Cybersecurity Spending?`

With the penetration of cyber threats every minute, cybersecurity has become critical in the personal…

8 months ago

TheEncrypt uses cookies.