Keith C. Perry via plug on 18 Jun 2020 12:05:01 -0700


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

Re: [PLUG] taskbook, Zoom


"We only consider your right to privacy valid
if you're a paying customer" is not a very good stance to take."


***smh*** no it isn't and yet people still will use Zoom.  I don't get that.  Threat priorities aside, that is a polite smack in the face.



~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ 
Keith C. Perry, MS E.E. 
Managing Member, DAO Technologies LLC 
(O) +1.215.525.4165 x2033 
(M) +1.215.432.5167 
www.daotechnologies.com

----- Original Message -----
From: "brent timothy saner via plug" <plug@lists.phillylinux.org>
To: plug@lists.phillylinux.org
Sent: Thursday, June 18, 2020 2:57:19 PM
Subject: Re: [PLUG] taskbook, Zoom

On 6/18/20 10:53 AM, Rich Freeman via plug wrote:
> On Thu, Jun 18, 2020 at 10:38 AM jeff via plug
> <plug@lists.phillylinux.org> wrote:
>>
>> Zoom decided to encrypt end-to-end, after the yelling.
> 
> While I obviously support E2E encryption, I think that people
> complaining about this don't have a great grasp on the threat model.
> 
> The only people that E2E encryption protects you from are those with
> access to the telecom infrastructure.

Oh, speaking of telecom, dial-in POTS/PBX bridge is disabled for E2EE
Zoom sessions (which makes sense; it'd be a bunch of static otherwise).

The E2EE can be disabled or enabled without disrupting the session.

>  This is all professionally
> managed and unless you are concerned about government spying/etc I
> think the risk of an attack here is relatively low.  Of course it is
> nonzero and so E2E encryption should be preferred.
> 
> What E2E encryption doesn't help with is attacks on the endpoints
> themselves - which are probably cellphones or desktop PCs.
> 
> Which do you think is more likely?  That some hacker managed to
> install a rootkit on somebody's Win10 PC?  Or that some hacker managed
> to install a rootkit on some router/switch at Verizon?

Or someone got port mirror access on the Starbucks' switch (which is SMB
stuff), or ARP poisoned their neighbour's consumer router, or
compromised one of those Linux-driven IoT devices on their network
(because most end-consumers aren't VLANning that stuff), or...

Remember, a lot of people are still working from home and with a
cantenna/yagi, you can do some pretty impressive things. Might not even
need a directional antenna if you're in a densely populated area like
the city.

And consumer router firmware is a sieve. (Hyperbolic, of course, but
it's... a problem. A very big and prevalent one.)

> 
> My point here isn't so much that you shouldn't care about E2E
> encryption.  Rather, my point is that simply having a features
> checklist in the software you're using doesn't make you secure.
> Usually the weak point in any chain of security is you...
> 

Sure, but that doesn't mean citizens don't have a right to privacy,
which E2EE grants. It's not about where the risk factor is, it's about
ethics first and foremost. Which is why there was so much outcry with
their initial response - "We only consider your right to privacy valid
if you're a paying customer" is not a very good stance to take.


___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug
___________________________________________________________________________
Philadelphia Linux Users Group         --        http://www.phillylinux.org
Announcements - http://lists.phillylinux.org/mailman/listinfo/plug-announce
General Discussion  --   http://lists.phillylinux.org/mailman/listinfo/plug