How Zoom Does End-to-End Encryption

Описание к видео How Zoom Does End-to-End Encryption

Zoom’s security team has properly determined that the first problem to solve, the first place to tighten things, is with the system’s key management. Once you have that, then the next weak link is identity: Verifying that meeting participant identities are not being spoofed or forged.

Subscribe & watch the full Security Now podcast: https://twit.tv/sn/769

Products we recommend: https://twit.to/amazon

TWiT may earn commissions on certain products

Join our TWiT Community on Discourse: https://www.twit.community/

Follow us:
https://twit.tv
  / twit  
  / twitnetwork  
  / twit.tv  

About us:
TWiT.tv is a technology podcasting network located in the San Francisco Bay Area with the #1 ranked technology podcast This Week in Tech hosted by Leo Laporte. Every week we produce over 30 hours of content on a variety of programs including Tech News Weekly, MacBreak Weekly, This Week in Google, Windows Weekly, Security Now, All About Android, and more.

Комментарии

Информация по комментариям в разработке