SlideShare a Scribd company logo
Zoom: Privacy and Security – A case study
Adri Jovin J J, M.Tech., Ph.D.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
Zoom
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
• Cloud-based Video Conferencing Service
• Founded: 2011
• Founder: Eric Yuan
Privacy issues – The timeline
March 26, 2020
• Investigation by Motherboard revealed that Zoom App (iOS) was sending user analytics data to Facebook
March 27, 2020
• Zoom removed Facebook data collection features
March 30, 2020
• Investigation by Intercept found Zoom call data was sent back to the company without end-to-end encryption
• Two more bugs discovered: (i) Malicious actor can gain control over user microphone or webcam
(ii) Vulnerabilities that allow Zoom to gain root access on MacOS desktop
• Zoom violated California’s new data protection law
• Zoombombing – led FBI to issue public warning about Zoom security vulnerabilities
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
The timeline…
April 1, 2020
• SpaceX bans Zoom
• Motherboard reported the leakage of data such as email addresses and photos to strangers through a feature which
operated as company directory
April 2, 2020
• Automated tool, zWarDial was able to find 100 Zoom meeting IDs, which were left unprotected by password, in an
hour
• New York Times reported that the data-mining feature of Zoom had secret access to Linkedin profile data of other
users
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
The timeline…
April 3, 2020
• Investigation by The Washington Post found thousands of recordings of Zoom video calls left unprotected and viewable in
open web
• Plans for Zoomraids by attackers
April 5, 2020
• Some video calls were mistakenly routed through two Chinese Whitelisted servers
April 6, 2020
• New York’s Department of Education urged schools to switch to Microsoft Teams
• Zoom accounts found on the dark web (352 accounts)
• Third class action lawsuit filed against Zoom in California (3 issues: Facebook data-sharing, incomplete end-to-end encryption,
vulnerability which allows actors to access webcams)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5
The timeline…
April 7, 2020
• Taiwan bans Zoom from government use
April 8, 2020
• Fourth lawsuit for falsely asserting that the service was end-to-end encrypted
• Google bans Zoom
• Sales of Zero-day exploits of Zoom by hackers for USD 5,000 TO USD 30,000, reported by Motherboard
• New update removing meeting ID from title bar for ongoing meetings to slow attackers who circulate screenshots
• AI Zoombombing
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6
The timeline…
April 9, 2020
• US Senate informs members not to use Zoom
• Singapore teachers banned from using Zoom
• German Ministry of Foreign Affairs in a circular told employees to stop using Zoom due to security concerns
April 10, 2020
• Pentagon restricts Zoom usage
April 13, 2020
• Cyble discovered that over 500,000 Zoom accounts are being sold on the dark web and hacker forums
• Zoom users advised to change their passwords and to check the data breach notification site https://haveibeenpwned.com/
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
The timeline…
April 14, 2020
• Lawsuit against Facebook and Linkedin for eavesdropping on Zoom users’ personal data
• Zoom introduces new privacy option for paid users
April 15, 2020
• Two critical exploits, one for Windows and one for MacOS that could allow someone to spy Zoom calls for sale in underground
market for USD 500000
April 16, 2020
• Security researcher discovered two new crucial privacy vulnerabilities in Zoom
i. found a way to access and download a company's videos previously recorded to the cloud through an unsecured link
ii. discovered that previously recorded user videos may live on in the cloud for hours, even after being deleted by the user
• Zoom hired Luta security to revamp its bug bounty program allowing white hat hackers to identify security flaws
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
Security and Privacy implications
Three basic problems
a. Bad privacy practices
b. Bad security practices
c. Bad user configurations
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
Privacy issues
• Spies user for personal profits
• Collects data including user name, physical address, email address, phone number, job information, Facebook profile
information, computer or phone specs, IP address, and any other information you create or upload
• Uses data for profit against your interest
• On March 29, 2020, Zoom rewrote its privacy policy as
“We do not sell your personal data. Whether you are a business or a school or an individual user, we do not sell your data. ….. We do not use data we obtain from your use of
our services, including your meetings, for any advertising. We do use data we obtain from you when you visit our marketing websites, such as zoom.us and zoom.com. You
have control over your own cookie settings when visiting our marketing websites.”
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
Security issues
• Last year, a researcher discovered that a vulnerability in the Mac Zoom client allowed any malicious website to enable
the camera without permission.
• Zoom designed its service to bypass browser security settings and remotely enable a user's web camera without the
user's knowledge or consent.
• Zoom patched this vulnerability last year.
• It only provides link(not end-to-end) encryption, which means everything is unencrypted on the company's servers
• Uses AES-128…ECB [Schneier quotes this as “there is no one at the company who knows anything about
cryptography”]
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
Bad User Configuration
• If the meeting is not configured appropriately, it open to all sort of mischief.
• A common one: Zoombombing
• Even without screen sharing, people are logging in to random Zoom meetings and disrupting them
• Meeting ID not long enough to prevent someone from randomly trying them
“Instead of making the meeting IDs longer or more complicated -- which it should have done -- it enabled meeting passwords by default. Of
course most of us don't use passwords, and there are now automatic tools for finding Zoom meetings”
-Checkpoint Research
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
Some guidelines
If usage of Zoom is unavoidable….
• Do not share meeting ID more that how much you have to
• Use password in addition to meeting ID
• Use waiting room if you can
• Pay attention to the permissions granted to users
• Advisory provided by Ministry of Home Affairs, Government of India
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
References
Zoom: Two new security exploits uncovered “https://www.cnet.com/news/zoom-every-security-issue-uncovered-in-the-
video-chat-app/”
Security and Privacy Implications of Zoom “https://www.schneier.com/blog/archives/2020/04/security_and_pr_1.html”
More on Zoom and privacy “https://blogs.harvard.edu/doc/2020/03/28/more-zoom/”
EPIC Files Complaint with FTC about Zoom “https://epic.org/2019/07/epic-files-complaint-with-ftc-.html”
Zoom-Zoom: We Are Watching You “https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/”
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14

More Related Content

What's hot

Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02
DataReportal
 
Digital 2023 Saudi Arabia (February 2023) v01
Digital 2023 Saudi Arabia (February 2023) v01Digital 2023 Saudi Arabia (February 2023) v01
Digital 2023 Saudi Arabia (February 2023) v01
DataReportal
 
Vietnam romance situation research among youth
Vietnam romance situation research among youthVietnam romance situation research among youth
Vietnam romance situation research among youth
Q&Me Vietnam Market Research
 
Digital 2022 Ethiopia (February 2022) v01
Digital 2022 Ethiopia (February 2022) v01Digital 2022 Ethiopia (February 2022) v01
Digital 2022 Ethiopia (February 2022) v01
DataReportal
 
INDONESIA DIGITAL 2021
INDONESIA DIGITAL 2021INDONESIA DIGITAL 2021
INDONESIA DIGITAL 2021
Ismail Fahmi
 
Chat Apps Usage In Vietnam
Chat Apps Usage In Vietnam Chat Apps Usage In Vietnam
Chat Apps Usage In Vietnam
DI Marketing
 
Flipchip Technologies & Market Trends 2015 Report by Yole Developpement
Flipchip Technologies & Market Trends 2015 Report by Yole DeveloppementFlipchip Technologies & Market Trends 2015 Report by Yole Developpement
Flipchip Technologies & Market Trends 2015 Report by Yole Developpement
Yole Developpement
 
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
DataReportal
 
Smartphone brand image in Vietnam
Smartphone brand image in VietnamSmartphone brand image in Vietnam
Smartphone brand image in Vietnam
Q&Me Vietnam Market Research
 
SwapSki Columbia Univ 2020
SwapSki Columbia Univ 2020SwapSki Columbia Univ 2020
SwapSki Columbia Univ 2020
Stanford University
 
Spotify in Vietnam - Update 2020
Spotify in Vietnam - Update 2020 Spotify in Vietnam - Update 2020
Spotify in Vietnam - Update 2020
Digital Trend by Think Digital
 
Youtube Presentation
Youtube PresentationYoutube Presentation
Youtube Presentation
townsend
 
WhatsApp
WhatsAppWhatsApp
Vespa in Vietnam
Vespa in VietnamVespa in Vietnam
Vespa in Vietnam
adriennejustine
 
Digital 2022 Pakistan (February 2022) v01
Digital 2022 Pakistan (February 2022) v01Digital 2022 Pakistan (February 2022) v01
Digital 2022 Pakistan (February 2022) v01
DataReportal
 
Digital 2022 Bangladesh (February 2022) v01
Digital 2022 Bangladesh (February 2022) v01Digital 2022 Bangladesh (February 2022) v01
Digital 2022 Bangladesh (February 2022) v01
DataReportal
 
The truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some mythsThe truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some myths
EduardoSuarez87
 
Kantar Media Trends Predictions 2023.pdf
Kantar Media Trends  Predictions 2023.pdfKantar Media Trends  Predictions 2023.pdf
Kantar Media Trends Predictions 2023.pdf
MarketingTrips
 
2021 Mondelez Snacking Made Right ESG Report (1).pdf
2021 Mondelez Snacking Made Right ESG Report (1).pdf2021 Mondelez Snacking Made Right ESG Report (1).pdf
2021 Mondelez Snacking Made Right ESG Report (1).pdf
JuanVictorSeminario
 
LINE : The Social Network success story
LINE : The Social Network  success storyLINE : The Social Network  success story
LINE : The Social Network success story
HUB INSTITUTE
 

What's hot (20)

Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02Digital 2022 France (February 2022) v02
Digital 2022 France (February 2022) v02
 
Digital 2023 Saudi Arabia (February 2023) v01
Digital 2023 Saudi Arabia (February 2023) v01Digital 2023 Saudi Arabia (February 2023) v01
Digital 2023 Saudi Arabia (February 2023) v01
 
Vietnam romance situation research among youth
Vietnam romance situation research among youthVietnam romance situation research among youth
Vietnam romance situation research among youth
 
Digital 2022 Ethiopia (February 2022) v01
Digital 2022 Ethiopia (February 2022) v01Digital 2022 Ethiopia (February 2022) v01
Digital 2022 Ethiopia (February 2022) v01
 
INDONESIA DIGITAL 2021
INDONESIA DIGITAL 2021INDONESIA DIGITAL 2021
INDONESIA DIGITAL 2021
 
Chat Apps Usage In Vietnam
Chat Apps Usage In Vietnam Chat Apps Usage In Vietnam
Chat Apps Usage In Vietnam
 
Flipchip Technologies & Market Trends 2015 Report by Yole Developpement
Flipchip Technologies & Market Trends 2015 Report by Yole DeveloppementFlipchip Technologies & Market Trends 2015 Report by Yole Developpement
Flipchip Technologies & Market Trends 2015 Report by Yole Developpement
 
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
Digital 2023 Global Overview Report (Summary Version) (January 2023) v02
 
Smartphone brand image in Vietnam
Smartphone brand image in VietnamSmartphone brand image in Vietnam
Smartphone brand image in Vietnam
 
SwapSki Columbia Univ 2020
SwapSki Columbia Univ 2020SwapSki Columbia Univ 2020
SwapSki Columbia Univ 2020
 
Spotify in Vietnam - Update 2020
Spotify in Vietnam - Update 2020 Spotify in Vietnam - Update 2020
Spotify in Vietnam - Update 2020
 
Youtube Presentation
Youtube PresentationYoutube Presentation
Youtube Presentation
 
WhatsApp
WhatsAppWhatsApp
WhatsApp
 
Vespa in Vietnam
Vespa in VietnamVespa in Vietnam
Vespa in Vietnam
 
Digital 2022 Pakistan (February 2022) v01
Digital 2022 Pakistan (February 2022) v01Digital 2022 Pakistan (February 2022) v01
Digital 2022 Pakistan (February 2022) v01
 
Digital 2022 Bangladesh (February 2022) v01
Digital 2022 Bangladesh (February 2022) v01Digital 2022 Bangladesh (February 2022) v01
Digital 2022 Bangladesh (February 2022) v01
 
The truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some mythsThe truth behind filter bubbles: bursting some myths
The truth behind filter bubbles: bursting some myths
 
Kantar Media Trends Predictions 2023.pdf
Kantar Media Trends  Predictions 2023.pdfKantar Media Trends  Predictions 2023.pdf
Kantar Media Trends Predictions 2023.pdf
 
2021 Mondelez Snacking Made Right ESG Report (1).pdf
2021 Mondelez Snacking Made Right ESG Report (1).pdf2021 Mondelez Snacking Made Right ESG Report (1).pdf
2021 Mondelez Snacking Made Right ESG Report (1).pdf
 
LINE : The Social Network success story
LINE : The Social Network  success storyLINE : The Social Network  success story
LINE : The Social Network success story
 

Similar to Zoom: Privacy and Security - A case study

DarkWeb.pptx
DarkWeb.pptxDarkWeb.pptx
DarkWeb.pptx
HammadUlHaque2
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
Bryley Systems Inc.
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
n|u - The Open Security Community
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
cscpconf
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
Rocket Matter, LLC
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
sahil lalwani
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
Jon-Michael C. Brook, CISSP
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Hamza
HamzaHamza
Hamza
HamzaBaqee
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
Peter Wood
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
IIIT Hyderabad
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
IRJET Journal
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
Cigdem Sengul
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
IJERA Editor
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
realpeterz
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
mehek4
 
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and BeyondSecuring the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Praveen Nair
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
IJSRD
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
Priyab Satoshi
 

Similar to Zoom: Privacy and Security - A case study (20)

DarkWeb.pptx
DarkWeb.pptxDarkWeb.pptx
DarkWeb.pptx
 
Bryley - mobility in the work place
Bryley  - mobility in the work placeBryley  - mobility in the work place
Bryley - mobility in the work place
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
PRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEYPRIVACY IN CLOUD COMPUTING: A SURVEY
PRIVACY IN CLOUD COMPUTING: A SURVEY
 
How to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data SafeHow to Secure Your iOs Device and Keep Client Data Safe
How to Secure Your iOs Device and Keep Client Data Safe
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
2013.11.30.Brook-CSA_Congress_EU_Avoiding_US_Cloud_Providers
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Hamza
HamzaHamza
Hamza
 
Attacking the cloud with social engineering
Attacking the cloud with social engineeringAttacking the cloud with social engineering
Attacking the cloud with social engineering
 
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT BombayPrivacy. Winter School on “Topics in Digital Trust”. IIT Bombay
Privacy. Winter School on “Topics in Digital Trust”. IIT Bombay
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
IoT security presented in Ada's List Conference
IoT security presented in Ada's List ConferenceIoT security presented in Ada's List Conference
IoT security presented in Ada's List Conference
 
Ci31560566
Ci31560566Ci31560566
Ci31560566
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
Securing the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and BeyondSecuring the Skies: Navigating Cloud Security Challenges and Beyond
Securing the Skies: Navigating Cloud Security Challenges and Beyond
 
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the CloudFog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
Fog Computing:The Justifying Insider Data Stealing Attacks in the Cloud
 
Online privacy & security
Online privacy & securityOnline privacy & security
Online privacy & security
 

More from Adri Jovin

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
Adri Jovin
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
Adri Jovin
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
Adri Jovin
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
Adri Jovin
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
Adri Jovin
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
Adri Jovin
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
Adri Jovin
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
Adri Jovin
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
Adri Jovin
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
Adri Jovin
 
Image based security
Image based securityImage based security
Image based security
Adri Jovin
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
Adri Jovin
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Adri Jovin
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
Adri Jovin
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
Adri Jovin
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
Adri Jovin
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
Adri Jovin
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
Adri Jovin
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
Adri Jovin
 

More from Adri Jovin (20)

Adri Jovin J J - CV
Adri Jovin J J - CVAdri Jovin J J - CV
Adri Jovin J J - CV
 
Introduction to Relational Database Management Systems
Introduction to Relational Database Management SystemsIntroduction to Relational Database Management Systems
Introduction to Relational Database Management Systems
 
Introduction to ER Diagrams
Introduction to ER DiagramsIntroduction to ER Diagrams
Introduction to ER Diagrams
 
Introduction to Database Management Systems
Introduction to Database Management SystemsIntroduction to Database Management Systems
Introduction to Database Management Systems
 
Neural Networks
Neural NetworksNeural Networks
Neural Networks
 
Introduction to Genetic Algorithm
Introduction to Genetic AlgorithmIntroduction to Genetic Algorithm
Introduction to Genetic Algorithm
 
Introduction to Fuzzy logic
Introduction to Fuzzy logicIntroduction to Fuzzy logic
Introduction to Fuzzy logic
 
Introduction to Artificial Neural Networks
Introduction to Artificial Neural NetworksIntroduction to Artificial Neural Networks
Introduction to Artificial Neural Networks
 
Introductory Session on Soft Computing
Introductory Session on Soft ComputingIntroductory Session on Soft Computing
Introductory Session on Soft Computing
 
Creative Commons
Creative CommonsCreative Commons
Creative Commons
 
Image based security
Image based securityImage based security
Image based security
 
Blockchain Technologies
Blockchain TechnologiesBlockchain Technologies
Blockchain Technologies
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Advanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of OperationsAdvanced Encryption System & Block Cipher Modes of Operations
Advanced Encryption System & Block Cipher Modes of Operations
 
Heartbleed Bug: A case study
Heartbleed Bug: A case studyHeartbleed Bug: A case study
Heartbleed Bug: A case study
 
Elliptic Curve Cryptography
Elliptic Curve CryptographyElliptic Curve Cryptography
Elliptic Curve Cryptography
 
El Gamal Cryptosystem
El Gamal CryptosystemEl Gamal Cryptosystem
El Gamal Cryptosystem
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Classical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structureClassical cryptographic techniques, Feistel cipher structure
Classical cryptographic techniques, Feistel cipher structure
 
Mathematical Foundations of Cryptography
Mathematical Foundations of CryptographyMathematical Foundations of Cryptography
Mathematical Foundations of Cryptography
 

Recently uploaded

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 

Recently uploaded (20)

National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 

Zoom: Privacy and Security - A case study

  • 1. Zoom: Privacy and Security – A case study Adri Jovin J J, M.Tech., Ph.D. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
  • 2. Zoom UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2 • Cloud-based Video Conferencing Service • Founded: 2011 • Founder: Eric Yuan
  • 3. Privacy issues – The timeline March 26, 2020 • Investigation by Motherboard revealed that Zoom App (iOS) was sending user analytics data to Facebook March 27, 2020 • Zoom removed Facebook data collection features March 30, 2020 • Investigation by Intercept found Zoom call data was sent back to the company without end-to-end encryption • Two more bugs discovered: (i) Malicious actor can gain control over user microphone or webcam (ii) Vulnerabilities that allow Zoom to gain root access on MacOS desktop • Zoom violated California’s new data protection law • Zoombombing – led FBI to issue public warning about Zoom security vulnerabilities UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
  • 4. The timeline… April 1, 2020 • SpaceX bans Zoom • Motherboard reported the leakage of data such as email addresses and photos to strangers through a feature which operated as company directory April 2, 2020 • Automated tool, zWarDial was able to find 100 Zoom meeting IDs, which were left unprotected by password, in an hour • New York Times reported that the data-mining feature of Zoom had secret access to Linkedin profile data of other users UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
  • 5. The timeline… April 3, 2020 • Investigation by The Washington Post found thousands of recordings of Zoom video calls left unprotected and viewable in open web • Plans for Zoomraids by attackers April 5, 2020 • Some video calls were mistakenly routed through two Chinese Whitelisted servers April 6, 2020 • New York’s Department of Education urged schools to switch to Microsoft Teams • Zoom accounts found on the dark web (352 accounts) • Third class action lawsuit filed against Zoom in California (3 issues: Facebook data-sharing, incomplete end-to-end encryption, vulnerability which allows actors to access webcams) UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5
  • 6. The timeline… April 7, 2020 • Taiwan bans Zoom from government use April 8, 2020 • Fourth lawsuit for falsely asserting that the service was end-to-end encrypted • Google bans Zoom • Sales of Zero-day exploits of Zoom by hackers for USD 5,000 TO USD 30,000, reported by Motherboard • New update removing meeting ID from title bar for ongoing meetings to slow attackers who circulate screenshots • AI Zoombombing UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6
  • 7. The timeline… April 9, 2020 • US Senate informs members not to use Zoom • Singapore teachers banned from using Zoom • German Ministry of Foreign Affairs in a circular told employees to stop using Zoom due to security concerns April 10, 2020 • Pentagon restricts Zoom usage April 13, 2020 • Cyble discovered that over 500,000 Zoom accounts are being sold on the dark web and hacker forums • Zoom users advised to change their passwords and to check the data breach notification site https://haveibeenpwned.com/ UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
  • 8. The timeline… April 14, 2020 • Lawsuit against Facebook and Linkedin for eavesdropping on Zoom users’ personal data • Zoom introduces new privacy option for paid users April 15, 2020 • Two critical exploits, one for Windows and one for MacOS that could allow someone to spy Zoom calls for sale in underground market for USD 500000 April 16, 2020 • Security researcher discovered two new crucial privacy vulnerabilities in Zoom i. found a way to access and download a company's videos previously recorded to the cloud through an unsecured link ii. discovered that previously recorded user videos may live on in the cloud for hours, even after being deleted by the user • Zoom hired Luta security to revamp its bug bounty program allowing white hat hackers to identify security flaws UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
  • 9. Security and Privacy implications Three basic problems a. Bad privacy practices b. Bad security practices c. Bad user configurations UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
  • 10. Privacy issues • Spies user for personal profits • Collects data including user name, physical address, email address, phone number, job information, Facebook profile information, computer or phone specs, IP address, and any other information you create or upload • Uses data for profit against your interest • On March 29, 2020, Zoom rewrote its privacy policy as “We do not sell your personal data. Whether you are a business or a school or an individual user, we do not sell your data. ….. We do not use data we obtain from your use of our services, including your meetings, for any advertising. We do use data we obtain from you when you visit our marketing websites, such as zoom.us and zoom.com. You have control over your own cookie settings when visiting our marketing websites.” UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
  • 11. Security issues • Last year, a researcher discovered that a vulnerability in the Mac Zoom client allowed any malicious website to enable the camera without permission. • Zoom designed its service to bypass browser security settings and remotely enable a user's web camera without the user's knowledge or consent. • Zoom patched this vulnerability last year. • It only provides link(not end-to-end) encryption, which means everything is unencrypted on the company's servers • Uses AES-128…ECB [Schneier quotes this as “there is no one at the company who knows anything about cryptography”] UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
  • 12. Bad User Configuration • If the meeting is not configured appropriately, it open to all sort of mischief. • A common one: Zoombombing • Even without screen sharing, people are logging in to random Zoom meetings and disrupting them • Meeting ID not long enough to prevent someone from randomly trying them “Instead of making the meeting IDs longer or more complicated -- which it should have done -- it enabled meeting passwords by default. Of course most of us don't use passwords, and there are now automatic tools for finding Zoom meetings” -Checkpoint Research UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12
  • 13. Some guidelines If usage of Zoom is unavoidable…. • Do not share meeting ID more that how much you have to • Use password in addition to meeting ID • Use waiting room if you can • Pay attention to the permissions granted to users • Advisory provided by Ministry of Home Affairs, Government of India UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 13
  • 14. References Zoom: Two new security exploits uncovered “https://www.cnet.com/news/zoom-every-security-issue-uncovered-in-the- video-chat-app/” Security and Privacy Implications of Zoom “https://www.schneier.com/blog/archives/2020/04/security_and_pr_1.html” More on Zoom and privacy “https://blogs.harvard.edu/doc/2020/03/28/more-zoom/” EPIC Files Complaint with FTC about Zoom “https://epic.org/2019/07/epic-files-complaint-with-ftc-.html” Zoom-Zoom: We Are Watching You “https://research.checkpoint.com/2020/zoom-zoom-we-are-watching-you/” UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 14