Zoom Rolls Out end-to-end Encryption (E2EE) for Free and Paid Users


Zoom rolls out end-to-end encryption (E2EE) free of charge and paid Zoom users starting from next week. In the end-to-end file encryption meeting, up to 200 participants can sign up with.

Zoom at first announced prepare for the end-to-end-encrypted meeting previously in May, it let all users create public cryptographic identities to establish trust relationships between meeting attendees.

Zoom end-to-end Encrypted Meeting

Starting from next week Zooms E2EE will be available as a technical preview for the very first 30 days to get feedback from users.

Zoom servers act just as a relay and they not able to bring the encryption secrets required to decrypt the conference contents.

While hosting a fulfilling the host generates encryption keys and uses public-key cryptography to disperse these keys to the other conference individuals.

With the Zooms E2EE GCM( Galois/Counter Mode) encryption is used, as it appropriates for video conferencing. GCM is a stream cipher, rather than a block cipher.

End-to-end encryption is another stride toward making Zoom the most safe interactions platform on the planet,” said Zoom CEO Eric S. Yuan.

Zoom end-to-end encrypted meetings will not support phone bridges, cloud recording, or non-zoom conference room systems.

To utilize now, clients need to enable Zooms E2EE from the account level

If you are using end-to-end-encryption participants can try to find a green guard logo in the upper left corner of their meeting screen with a padlock in the middle to indicate their meeting is utilizing E2EE.

In the meantime with the existing version Enabling the Zooms E2EE in your meetings disables particular functions, including signing up with before host, cloud recording, streaming, live transcription, Breakout Rooms, ballot, 1:1 private chat, and conference reactions.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Check out

A New Zoom URL Flaw Let Hackers Mimic Organizations Invitation Link

Zoom 0day Vulnerability Let Remote Attacker to Execute Arbitrary Code on Victims Computer

New Zoom Flaw Let Attackers to Hack into the Systems of Participants by means of Chat Messages