Disclaimer: I’m not a security expert, but I have been involved with security aspects of software development and deployment as part of my job.
- Zoom does not support end to end encryption. Cramer said in the interview with Zoom’s CEO that Webex doesn’t offer end to end encryption either. That is incorrect. Here is WebEx’s page on that: https://help.webex.com/en-us/WBX44739/What-Does-End-to-End-E…
Media streams flowing from a client to Cisco Webex servers are decrypted after they cross the Cisco Webex firewall. Cisco can then provide network-based recordings that include all media streams for future reference. Cisco Webex then re-encrypts the media stream before sending it to other clients.
This is similar to what Zoom does. What’s different is that WebEx already offers an end to end encryption setting (https://help.webex.com/en-us/n4f016ab/Use-End-to-End-Encrypt… ). As WebEx states (first link):
However, for businesses requiring a higher level of security, Cisco Webex also provides End-to-End encryption. With this option, the Cisco Webex cloud does not decrypt the media streams, as it does for normal communications. Instead it establishes a Transport Layer Security (TLS) channel for client-server communication. Additionally, all Cisco Webex clients generate key pairs and send the public key to the host’s client.
The host generates a symmetric key using a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG), encrypts it using the public key that the client sends, and sends the encrypted symmetric key back to the client. The traffic generated by clients is encrypted using the symmetric key. In this model, traffic cannot be decoded by the Cisco Webex server.
I can translate that.
If E2E Encryption is enabled in WebEx, then:
- TLS (what underlies the “https” we all know and love) is used to protect data flowing between meeting clients and WebEx. This stops internet eavesdropping.
- The host client (not the WebEx server) generates a Meeting Encryption Key using a good method (CSPRNG).
- Each client has its own Private Key that no-one else knows, not even WebEx.
- Each meeting client sends their corresponding Public Key to the host of the meeting.
- The host client encrypts the meeting key with each client’s Public Key and sends that to each client.
Note: the way Private/Public keys work is that one key is used to encrypt, the other to decrypt AND that the key used to encrypt will not successfully decrypt, so it’s OK to share the Public key with everyone, as implied by its name.
- Now each meeting client has the Meeting Encryption Key, so they can all encrypt their feeds and decrypt everyone else’s.
- WebEx itself does not have the Meeting Encryption Key, so it cannot decrypt the meetings.
The whole point of E2E encryption is that no-one except the ends can decrypt. Zoom doesn’t have this capability today.
Some commentary on this:
A) It is a lot more than a bug fix to implement a scheme like this.
B) Some of the cryptographic capabilities needed in the clients will make them illegal to be exported to some countries. (US Gov regulations).
C) As a corporate customer, I would consider Zoom’s incorrect characterization of their encryption as “end to end encryption” a disqualifying flaw. Assuming it wasn’t intentional, even assuming the engineer’s designing end implementing the system knew better but product management decided it wasn’t a necessary feature, not having the internal mechanisms to prevent Marketing from incorrectly classifying the security of the product is itself indicative of a lack of necessary oversight.
In that last regard, when Cramer brought up Zoom hiring an outside security company (he mentioned Crowdstrike) to review Zoom’s security practices, Yuan didn’t say “We already do/did that.” He didn’t even say “We’re going to do that.” Using a third-party security company is not just de rigueur, it’s standard operating procedure. If Zoom hasn’t done that, it’s yet another corporate adoption disqualifying attribute. Another is that Zoom doesn’t produce regular transparency reports, another standard operating procedure.
-
End to end encryption isn’t the only way to accomplish a high degree of privacy. Zoom has promised (https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-… ) to provide features in the future to enable: certain versions of our connectors within their own data centers if they would like to manage the decryption and translation process themselves. It’s more trouble for customers this way, but having the meeting streams hosted entirely within a corporate’s network would provide enough security for many corporate customers. Note, however, this is a future feature promise, not a bug fix nor a current feature.
-
The China server thing:
Since Zoom holds the Meeting Encryption Key on its servers (remember, no E2E encryption option), they apparently have yet another bug where they don’t control which of their servers get which keys. If any of those servers are located in China, then by Chinese law, China already has access to the data on those servers, and hence has the keys. Period.
It is possible if the Chinese government wanted, to look in real-time at the Zoom Meeting Encryption Keys and find meetings to decrypt as they’re happening. That sounds impractical, but it’s indicative of bad security practices.
What we don’t yet know is whether meeting recordings also are being stored on servers in China. If so, the Chinese government by law already has access to those recordings. Even if they’re encrypted on the server, China may also have the encryption key since Yuan admitted those sometimes get to Chinese servers.
I have been involved with providing my company’s products/services to customers in China. Here’s a supporting data point: On a 60 minutes episode (https://www.cbsnews.com/news/electric-cars-chinas-drive-to-d… )in Feb 2019 on EV company Nio, they visited the Shanghai Electric Vehicle Data Center, a government agency which collects millions of bits of information every day on nearly 200,000 electric cars on this city’s streets. They’re looking a screen showing a portion of a map of Shanghai, with dots (some moving) representing cars they’re tracking.
Inside every electric vehicle in the city is a black box, automatically transmitting data to the center every 30 seconds.
Ding Xiaohua: For example, the speeds, the mileage, the battery temperature.
Holly Williams: And does that help the government plan for the future?
Ding Xiaohua: Yes, public charging points, how many public charging points? And where it is best place for the public charger.
Turns out all the cars were Teslas, and that they were looking at data from Tesla’s own servers transmitted every 30 seconds to the government. Tesla was required to do that. (I don’t now or ever have worked for Tesla). Drive a Tesla in China and the government knows where you are within 30 seconds or less. No subpoena needed.
- Just 5 days ago, Zoom issued a blog post (https://blog.zoom.us/wordpress/2020/04/01/facts-around-zoom-… ) that has been discussed much here. In part it says: To ensure this entire process meets the needs of our customers around the clock and around the world, Zoom currently maintains the key management system for these systems in the cloud. Importantly, Zoom has implemented robust and validated internal controls to prevent unauthorized access to any content that users share during meetings, including – but not limited to – the video, audio, and chat content of those meetings.
Well, we now see that these “robust and validated internal controls” are not so robust, and this makes the “validated” aspect suspect (see above for lack of third party scrutiny).
- Zoom has had a history of not considering security in their product. Back in June 2019, Zoom was found to have intentionally bypassed Apple security to enable users to join a call without clicking a Safari box confirmation to run the Zoom application. Here’s Zoom blog post from the time: https://blog.zoom.us/wordpress/2019/07/08/response-to-video-…
At first, Zoom denied this was a security issue and refused to patch. But, after much press, including explanations about how malicious attackers would leverage this by sending a tiny URL via email or text to someone, who would then click it, and it would start the meeting unbeknownst to the user, and thus his webcam would be on for the attacker to view and hear. Zoom initially tried saying that they would let people secure themselves by providing an option to not turn the camera on by default, but later relented and issued a patch to not provide this hackable local web server.
Unfortunately, Zoom’s engineering wasn’t on the ball. As Zoom admitted: We do not currently have an easy way to help a user delete both the Zoom client and also the Zoom local web server app on Mac that launches our client. The user needs to manually locate and delete those two apps for now. This was an honest oversight.
This episode cements for me that the company is focused on ease of use above all else. That is a good thing, if their security was good enough and not misrepresented.
- Yes, some of the criticisms have been overblown and misrepresented. For instance, some have shown a frame from a Zoom meeting with the UK Prime Minister as if that was hacked, when in fact it was a frame tweeted by Boris Johnson himself: https://twitter.com/BorisJohnson/status/1244985949534199808 . So there is some fake news on Zoom, but that doesn’t wash away the real security issues Zoom has.
–
In my view, what has happened is that Zoom is being forced to grow up more rapidly than they expected. Their focus on ease of use was great. However, their free limited account tactic has backfired on them in this travel lock-down era as they were clearly unprepared to support the security needs of many corporate and government clients. They compounded the issue by incorrectly advertising not just their security implementations, but also apparently their security practices, which by all apparent measures are insufficient. This has resulted in bad press even for people like my family, who are now questioning they should still hold things like Book Club on Zoom for instance.
I still have a moderate position in ZM, which is still up fairly nicely. But, I have lost all faith in management’s ability to address their security issues, and think that their blog posts and CEO visits on Cramer and the like will eventually not be good enough. At this point, they’re surviving by their ease of use advantage and freemium model. This leaves big holes for the competition to step into, but I don’t know if any will.