Title: Zoom Acquires Keybase to Add End-to-End Encryption
1Zoom Acquires Keybase to Add End- to-End
Encryption
INSIDEUP.COM
2Zoom recently acquired Keybase, a company that
has been enhancing data privacy for Internet
users since 2014. It offers a public-key
generation and maintenance service that enables
users to encrypt assets and transmissions like
shared files and social media messages.
3What is end-to- end encryption?
End-to-end encryption is the most reliable way to
ensure that businesses communicate securely and
privately online. It prevents anyone, able to
gain access to the flow of information on a
digital transmission line,from having access to
the actual private information by encrypting
messages emanating from both sides of a
conversation.
4The benefits of end-to-end encryption over
conventional at rest encryption are as follows
01 02
End-to-end encryption keeps your data safe from
hackerswhile in transit because no component
along the full line of transmission will have
access to unencrypted data. Even if your data
stored on a service providers servers gets
compromised hackers will still not be able to
access the keys and decrypt your information.
End-to-end encryption promotes a democratic
society since it gives everyone equal right to
privacy. It protects journalists and dissidents,
giving individuals the right to free speech
within cyber space, and shields persecuted
activists from intimidation.
503
04
End-to-end encryption keeps data private and
gives individuals full control over
accessibility including who reads their
messages. For example, when using Gmail(without
the benefit of end- to-end encryption), Google
has access to every piece of intimate
information you put in your emails. It can even
store a copy of your emails after you delete
them.
As the demand for Zoom, in the wake of the
Covid-19 crisis, has soared over the last few
months, business users have encountered many
security issues. Increased usage to support
work-from- home employees highlighted Zooms
many data privacy weaknesses.
6Combining Keybases encryption mechanism into
Zoom operations, if integrated appropriately,
will offer business users a higher-level of
security assurance. Zoom deserves credit for how
quickly it has managed to acknowledge and begun
to resolve its security issues. This will blunt
the impact of competing video conferencing
solutions that seek to drive a wedge between
personal usage of Zoom and its emerging status
as a significant player in the world of business
communications. I NSIDEUP.COM