Well, apparently, you always could, but now audio will work.
Also, the meeting organizer must click a button to generate a web link or you’ll be taken to a page telling you to install their desktop program or a browser plugin.
#Uber lays off 3700 employees via #Zoom conferencing.
Is this the equivalent of breaking up via text message? It feels like it, but I do not know how they could have done it better. Did they tell 500-1000 at a time, or sit down and have one-to-one videochats?
One of my brothers sent me an e-mail where he accused me of brainwashing her against Zoom. I sent a long response. It took me a while to write, so hopefully I got past reacting to his accusation.
I said I don’t know why your camera suddenly didn’t work today. It has worked in all the other videochats. I don’t know why another brother’s microphone didn’t work today. Likewise, it has worked in all the other videochats.
Someone recommending the closure of #Keybase accounts and rotating keys, passwords, and anything else that KB has touched.
I probably have not been as vocal about it, but ever since I personally discovered (very early on in KB's existence) that following their default instructions uploaded your #privkey to their server, I have recommended avoiding them, cancelling any keys used with them, closing any existing KB accounts. I still feel that way ... and tying up with #Zoom is unlikely to improve my opinion of them.
Not sure that buying Keybase, a company that originally uploaded people's #GPG #privkey by default, is going to add any understanding of security at all. I've avoided them since I discovered they were uploading private keys by default (though I've heard they later changed that) because that indicated they did not know what they were doing.
I am glad that Zoom seems serious about fixing their issues. I just don't think this is advancing toward that goal. Now, instead of one business with severe security issues, they have two businesses which might have such issues.
USD$7B? Dang. That's a lot. Is it all from his ownership stake in #Zoom? A lot of times, these guys have 2-3 former ventures which they've sold for big bucks before they reach the billionaire level.
I thought you were replying to https://nu.federati.net/notice/3303931 ... my son is doing tutorials based on some variety of #Ubuntu. My co-worker #S is trying to help someone decide whether to allow the doctor to videochat (via a system called "Zoom") instead of a face to face visit.
It seems odd that they could use #Zoom unless they are HIPPA certified. With all the security flaws they seem to be having, and privacy flaws as well, I cannot imagine that Zoom is #HIPPA certified.
Yet another reason to wonder whether #Zoom’s management is just ignorant about #privacy and #security, or actively malicious. “End to end” encryption has a specific meaning, namely that messages sent from your device are encrypted until they arrive at your recipients’ devices, so that no one in between, including any service providers, can read the message payload. If that is not the case, it is not #E2EE.
"… Without end-to-end encryption, Zoom has the technical ability to spy on private video meetings and could be compelled to hand over recordings of meetings to governments or law enforcement in response to legal requests. While other companies like Google, Facebook, and Microsoft publish transparency reports that describe exactly how many government requests for user data they receive from which countries and how many of those they comply with, Zoom does not publish a transparency report. On March 18, human rights group Access Now published an open letter calling on Zoom to release a transparency report to help users understand what the company is doing to protect their data. …"