Ultimately Keybase's future is in Zoom's hands, and we'll see where that takes us. There are no specific plans for the Keybase app yet. A Keybase blog states: Initially, our single top priority is helping to make Zoom even more secure. We believe there are potential workarounds that will be developed, but the question is how long it will take.”įor its part, Keybase isn’t offering more clarity. Morgan analyst Sterling Auty cites the difficulty of getting Zoom and Keybase platforms together: “One of the big challenges in utilizing end-to-end encryption is how do you support systems that are in conference rooms…. But some wonder whether Zoom can integrate Keybase quickly and effectively. It's not hard to imagine all kinds of interesting permutations from adding Keybase technologies to Zoom. Keybase also features a downloadable virtual wallet for the Stellar Development Foundation’s cryptocurrency blockchain. Team-based file sharing, chat, and open-source version control. Thousands of participants are supported for Besides featuring a PGP-based public key directory, Keybase has its own platform capable of interacting with multiple collaborative apps across a range of devices. On the surface, Zoom and Keybase seem a great match. How blockchain can take over the world Futuriom's Top 10 Cloud Tech Stories of 2020Īs 2020 closes, we revisit its tech highlights and defining moments. MetaCX, co-founded by former Salesforce Marketing Cloud CEO Scott McCorkle, draws on graph database and blockchain to create a neutral collaboration service for B2B partners What Is Blockchain? The feature was meant to allay fears that Zoom chats and encryption keys were being sent to Chinese servers, where the data could be hijacked by Chinese intelligence.MetaCX Launches a Digital Ecosystem Network The came Zoom's 5.0 update, which added data center routing capabilities for account administrators. Facing mounting criticism, Yuan announced on April 1 that the company would stop development on all new app features and focus entirely on security.Ī week later, the company hired former Facebook security chief Alex Stamos as an outside security consultant. Zoom was an early beneficiary of the videoconferencing boom spurred by the novel coronavirus pandemic, but the platform's weaknesses were quickly exposed after experts found security flaws in the app's code and privacy issues with user data management. We believe this will provide equivalent or better security than existing consumer end-to-end encrypted messaging platforms, but with the video quality and scale that has made Zoom the choice of over 300 million daily meeting participants, including those at some of the world's largest enterprises. Encryption keys will be tightly controlled by the host, who will admit attendees. Zoom Rooms and Zoom Phone participants will be able to attend if explicitly allowed by the host. These end-to-end encrypted meetings will not support phone bridges, cloud recording, or non-Zoom conference room systems. We are also investigating mechanisms that would allow enterprise users to provide additional levels of authentication. The cryptographic secrets will be under the control of the host, and the host's client software will decide what devices are allowed to receive meeting keys, and thereby join the meeting. This key will be distributed between clients, enveloped with the asymmetric keypairs and rotated when there are significant changes to the list of attendees. An ephemeral per-meeting symmetric key will be generated by the meeting host. Logged-in users will generate public cryptographic identities that are stored in a repository on Zoom's network and can be used to establish trust relationships between meeting attendees. In a blog post Thursday, Zoom CEO Eric Yuan said the Keybase acquisition will allow Zoom to offer an end-to-end encrypted meeting mode to all paid accounts. Zoom's marketing practices suggested that the company used the AES-256 encryption standard to keep video calls secure, but instead, a substandard AES-128 key in ECB mode was actually in use.Įncryption has remained a focal point for Zoom over the last several weeks and is at the forefront of the company's 90-day plan to improve the security and privacy capabilities of its platform. Zoom came under fire earlier this year for saying that its platform used end-to-end encryption when in fact it did not.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |