Cyber security experts are warning people that the video meeting programs we now rely on might not be as secure as some might think. “Zoom bombing” is becoming a trend where people who are not supposed to be able to access Zoom meetings are getting in anyway. The experts say that people using the program should double check their privacy settings, and shouldn’t post the link to zoom meetings on public forums unless necessary.
Telecommuting and home-based learning is the new normal and people around the world are using video meetings and its essential that you know how to use video conferencing tools safely.
In Singapore more than half a million students will be on home-based learning and even more adults will use video meeting working from home.One day after the start of the home-based learning period on April 8 the Singapore Ministry of Education announced that it was suspending Zoom following one incident in which hackers hijacked some students’ Zoom stream and showed pornographic content.
Similar “Zoom bombing” incidents have been reported around the world. In the wake of this and other privacy and cyber security concerns. Zoom has improved some of its security features and meeting controls. So what should users take note of to prevent themselves from becoming victims of harassment, privacy loss and eavesdropping when using video conferencing tools ?
Five Top Tips
It is vital to use the latest version of the software so that the bugs of the past would have been removed or fixed.
Remember that companies such as Zoom collect personal data such as name, email address, phone number, job title and even employer, as well as the IP address and device being used. Furthermore, if users sign in using Facebook, information will be collected from the Facebook profile. To retain some privacy, avoid using Facebook to sign in.
Do not share your meeting link on public forums or on social media as this makes it easier for unauthorised persons to gain access to your meeting.
Familiarise yourself with your platform’s features and settings so as to be secure and protect your virtual space. For instance, Zoom has a “Waiting Room” feature that enables the host to manage the people who join and leave the meeting. Using this feature will enhance your security when hosting a meeting.
Users should refrain from using one’s Personal Meeting ID (PMI) to host events for the public. One’s PMI is a personal virtual meeting space that should not be open to others, except for close and trusted colleagues or users.
While using their video cameras during a Zoom session, users who want to increase the privacy level and prevent others from seeing the details of their physical background or surroundings can activate the virtual background feature such as a scene from the beach. You can choose to switch off your camera, if the video feature is not required.
As a host of meetings or conferences, you can take extra precautions. For example, you should retain control of the screen.
Before and during a meeting, you can restrict the ability to screen share, so as to prevent others from sharing undesirable content or snatching control of your screen.
Additional security measures include setting up a two-factor authentication. Users can then only get access if they have the randomly generated meeting ID and a password. This enhances the level of security and limited access.
Another approach is to only enable signed-in or pre-invited users to join in the meeting.
You can “lock the meeting”. This Zoom feature allows the host to prevent others from joining the meeting. In this way, those with the meeting ID and password also cannot enter this virtual meeting room, once it is “locked”.
To increase security and control as a host, you can exercise the option to remove disruptive and undesirable participants from the meeting.
You can put the participants on hold and temporarily disable their video and audio connections to reduce noise and prevent interference.
Such features will be useful for educators when they are using video-conferencing tools with an excited or vocal group of students.
Besides Zoom, there are other video-conferencing options such as Skype, though it has a limit of a maximum of 50 users per session. Users might also consider using more secure platforms for business, like Google Meet and Facetime. Microsoft Teams is another free and popular video-conferencing platform with file and screen sharing features, capable of hosting up to 250 participants in a meeting.
Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.
Another leading provider is Cisco Webex, which offers a secure video-conferencing platform that does not require participants to have a Webex account to join the online meetings. Its free version can host up to 100 participants, with a range of features including a white board function and no time limit for meetings.
Ultimately, each video-conferencing option has its strengths and limitations and the onus is on users to examine the security features carefully and use them effectively. Companies offering video-conferencing tools should highlight to users their security features and make a number of these features the default standard mode of use.
Parents and teachers could also educate their young to be aware of the importance of cyber security and to apply security measures when they are online. Cyber security is an essential life skill to protect us from online dangers and viruses, as we work and learn at home, while we fight the Covid-19 pandemic.
Zoom security: I’ve researched problems with video conferencing for years – here’s what you need to know
PhD Candidate in Cyber Security, De Montfort University
Disclosure statement
Thomas Reisinger does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond their academic appointment.
Republish our articles for free, online or in print, under a Creative Commons license.
The video conferencing app Zoom gained about 2 million new users in the first two months of 2020 – and that was before the World Health Organization declared the coronavirus outbreak a pandemic. With so many people now relying on video conferencing for contact with their friends, family and colleagues, it’s no wonder Zoom has seen a significant increase in its company stock price. But the firm has also attracted some negative press recently for issues related to its privacy and security.
I worked in the video conferencing industry for 10 years. During this time, I started a PhD on whether such systems meet the needs of organisations that have to communicate under adversarial circumstances, such as international NGOs and opposition groups under oppressive regimes. My near-finished research shows that Zoom has indeed had plenty of problems, but is far from the only platform with security and privacy issues.
A number of issues with Zoom have attracted public attention, most notably call hijacking or “Zoom-bombing”. Calls that are not set to private or password-protected can be accessed by anyone who inputs the nine- to 11-digit meeting code, and researchers have shown how valid meeting codes could easily be identified (something Zoom now says it prevents).
Zoom has also recently had to make changes to its iPhone and iPad apps to stop Facebook being able to collect data about users. And last year it was forced to fix a problem that could have allowed websites to turn on Mac users’ cameras without permission.
Another issue, recently highlighted by The Intercept, is that Zoom claims its calls can be encrypted, but doesn’t use the kind of end-to-end encryption that many people have come to understand as standard for private communication services. Messages or calls sent with end-to-end encryption are effectively locked with the receiving user’s public key that anyone can access, but can only be unlocked by the user’s private key. This system is used by messaging apps such as WhatsApp to ensure only a message’s recipient can read it – not even the app’s provider has access.
Zoom instead uses the AES-256 ECB method of encryption, which shares the key used to encrypt calls with Zoom’s servers around the globe. This potentially gives them full access to the audio and video streams, although the company has stated no user content is available to its employees or servers once encrypted.
Researchers have also found that encryption keys even up on Zoom servers based in China (where the company has development sites) even when no Chinese participants are in the call. This opens the possibility that the Chinese government, famed for its control of internet communications in the country, could eavesdrop on calls. Zoom has now started offering paying customers the ability to opt out of having data routed through China or other regions.
While Zoom has developed measures or options to at least partly address all of the issues highlighted – and said it will freeze the development of new features for 90 days so it can focus on improving security – the litany of problems that have already been identified should provoke serious thought among its users. On top of this, Zoom’s privacy policy is arguably not user-friendly. By downloading the app, you essentially grant the company permission to do with your personal data whatever they want.
The problem for anyone looking for a more private system is that many of Zoom’s competitors have their own similar security issues. For example, Microsoft’s Skype and Teams services also use forms of encryption that give the company control over the keys.
Alternatives
So what are the alternatives? The most secure options are arguably those that use end-to-end encryption and are built with open-source code because it can be publicly reviewed to check it doesn’t have any hidden problems.
Signal is a messaging app that falls into this category and also provides video calling from smartphones, but not desktop video calls or video conferencing with multiple parties. Jitsi is also open source and provides end-to-end encrypted video calls via a web browser, and is working on doing the same for multi-party video conferencing.
If these options don’t suit you, then there are things you can do when using Zoom or other video calling services that have potential security issues to maximise your privacy and safety.
Enforce encryption by default and makes sure it’s end-to-end if possible
Lock and password-protect meetings
Unauthenticated users should be held in a waiting room so the organiser can check their identity before admitting them to the call
Make sure a meeting host monitors the participants list and ensures no unknown participant joins
Be careful with meeting recordings and get consent from the participants
Be aware that audio-only participants calling via a regular phone dial-in option will “break” the encryption
Be careful with file and screen-sharing capabilities. They could accidentally disclose sensitive information or be used to spread malicious programs.
In response to the issues raised in this article, a Zoom spokesperson said:
Zoom takes user privacy, security, and trust extremely seriously. Zoom was originally developed for enterprise use, and has been confidently selected for complete deployment by a large number of institutions globally, following security reviews of our user, network and datacenter layers.
During the COVID-19 pandemic, we are working around-the-clock to ensure that businesses, schools, and other organizations across the world can stay connected and operational. As more and new kinds of users start using Zoom during this time, Zoom has been proactively engaging to make sure they understand Zoom’s relevant policies, as well as the best ways to use the platform and protect their meetings.
This new and deadly pathogen is confusing enough for medical and scientific experts to understand. For the public, it’s even more so. At The Conversation, my colleagues and I are dedicated to finding academic experts who can best sort through the confusion and explain developing coronavirus science. Your donation of $5, $50 or $500 will help us distribute factual, responsible analysis, free of charge, to readers everywhere.
If you get one thing right, become passionately focused on the quality of the foods you “hunt” and I guarantee that you will see profound positive change in your overall health that will cascade into all of the other areas of your life. When you consume the highest quality foods (akin to our ancestors hunting the biggest and most sought after game), you will thrive- I know this with every fiber of my being and it is why I do what I do with Heart & Soil, my book, my podcast and all of my social media. My “why” is sharing with you, and as many people possible (Thousands? Hundreds of thousands? Millions?) the truths that I have discovered on my own journey.
Animal foods are the most nutrient rich nourishment on the planet. They are an absolute part of the human diet if we seek vitality, vigor, and ass-kickery. They have also been unjustly maligned by the mainstream media based on misleading epidemiology (you can read all about this in my book, The Carnivore Code.)
Plants exist on a spectrum of toxicity and contain defense chemicals (phytoalexins) that may be damaging and toxic for many individuals. In order to survive their co-evolution with animals, insects, and fungi over the last 450 million years, plants needed to develop chemicals that protect them from unabated predation. For many people, elimination of some or all of these chemicals will lead to a higher quality of life.
AT HEART & SOIL, WE’RE ALL ABOUT THESE TRUTHS
Our supplements are 100% animal based and contain zero plant based products or fillers.They are also sourced from the finest animals on the planet, raised on regenerative farms in the pristine lands of New Zealand and soon from regenerative farms right here at home in the United States.
But the story doesn’t end there. When our currently living indigenous people hunt animals, and when our predecessors hunted animals, they didn’t just eat the muscle meat. They ate the spoils of their sacred hunting rites in their entirety, from nose-to-tail. Consuming animals in this way and wasting nothing, shows great respect for the fundamental circle of life and death that we all participate in, and we now know that from a nutritional biochemistry perspective it provides our body with all of the nutrients we need to thrive.
What a beautifully elegant truth that everything, every vitamin, mineral, peptide, protein, and co-factor that the human body needs to function optimally can be obtained from consuming animals in their entirety. Our ancestors knew this, but it’s a sacred idea that’s been lost between recent generations, and the health effects within our culture are profoundly negative.
Over 40% of our brothers and sisters now meet the formal criteria for obesity, and only an elite 12% of our population can truly be considered metabolically healthy (CDC Obesity Report 2017-2018, Metabolically Unhealthy)!
It is no hyperbole when I say that this is absolutely because we have forsaken the nutritional wisdom of our forefathers and foremothers.
We have traded nose to tail animal foods for ultra processed carbohydrates, sugars and vegetable oils that invariably lead to the smoldering inflammation that underlies the rampant epidemics of autoimmunity and chronic disease we now face as a greater human tribe.
HOW DO WE CORRECT THESE MISSTEPS AND REMEMBER THE WISDOM OF OUR PREDECESSORS?
Eating meat from properly raised animals is a great start, but it’s only part of the equation. To truly obtain ALL of the nutrients you need to thrive, organs like liver, bone marrow, spleen, heart, kidney, thymus, intestines, and testicle are crucial. Muscle meat has lots of nutrition, but it doesn’t have everything. On the product pages for our carefully crafted supplements you’ll find a wealth of information about all the nutrients, peptides and growth factors that are uniquely found in meaningful quantities in organs how these special “vital-mins” help us live radically.
Though organs are foreign to many of us, I am deeply committed and incredibly passionate about helping make them more available for you and your family. On the “About us” page you’ll find a video of how I eat in a day- fresh organ meats are a critical part of my diet. If you can eat them fresh this is always the best, but if this is challenging for you, or you’re looking to be even more radical, our desiccated supplements (low temperature dehydration preserves as many of the key nutrients as possible- you can read more about it here (link)) will absolutely support your journey to optimal health.
If you are reading this page, there’s a very good chance that you’ve discovered the value of nose to tail animal foods in your diet and are ready for a change within your own life and to be a beacon of change for those around you. If you believe what we believe, now is the time for you to join our tribe, we’ve been waiting for you. We can’t wait to celebrate the reclamation of your ancestral birthright to radical health, strength, and vitality by including the most nutrient rich foods on the earth in your diet by consuming the organ meats in our supplements.
RECLAIM YOUR ANCESTRAL BIRTHRIGHT TO RADICAL HEALTH, STRENGTH & VITALITY
Eating animals nose to tail provides us with all of the nutrients needed to thrive
JOIN OUR TRIBE,
FOLLOW THE RADICAL MEN AND WOMEN OF HEART & SOIL
@heartandsoilsupplements
#heartandsoil
"When the blood in your veins returns to the sea, and the earth in your bones returns to the ground, perhaps then you will remember that this land does not belong to you, but it is you who belong to this land."
-ANONYMOUS
JOIN THE INTERNET's LARGEST NOSE TO TAIL NEWSLETTER
Join our tribe and we'll send you our quick start guide to eating nose to tail, tribe member discounts, and product updates.