{"id":9393,"date":"2020-05-05T09:25:57","date_gmt":"2020-05-05T16:25:57","guid":{"rendered":"https:\/\/nkn.org\/community\/blog\/video-call-safety-how-secure-is-zoom-and-other-video-conferencing-tools\/"},"modified":"2020-05-05T09:25:57","modified_gmt":"2020-05-05T16:25:57","slug":"video-call-safety-how-secure-is-zoom-and-other-video-conferencing-tools","status":"publish","type":"post","link":"https:\/\/nkn.org\/ko\/community\/blog\/video-call-safety-how-secure-is-zoom-and-other-video-conferencing-tools\/","title":{"rendered":"Video Call Safety: How Secure is Zoom and Other Video Conferencing Tools"},"content":{"rendered":"\n<p>No one could have ever predicted what 2020 has in store for us. A global pandemic that forces us to stay home in isolation is not part of the prediction. It sounds like something from a science fiction novel, but it\u2019s pretty much happening in real life, and social distancing and isolation are going to be the &#8220;new norm&#8221; for the unforeseeable future. Until a vaccine is discovered, every one of us is at risk. For now, all we can do is follow government advice on staying home, social distancing, and <strong>utilizing technology to fill in the gaps and keep us going.<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>Related:<\/strong><a href=\"https:\/\/blog.nkn.org\/is-whatsapp-safe-heres-what-you-need-to-know-nkn\/\"><strong> Is WhatsApp Safe? Here\u2019s What You Need to Know | NKN<\/strong><\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video Calling More Important Than Ever&nbsp;<\/strong><\/h1>\n\n\n\n<p>In order to keep the economy going, to socialize with loved ones, and to ensure our children keep up to date with their education, <strong>video calling<\/strong> has become a necessity. These programs allow us to<strong> stay in touch with others<\/strong> and can be the next best thing to meeting in person.&nbsp;<\/p>\n\n\n\n<p>We\u2019re lucky to live in a time when staying in and physically isolated from others doesn&#8217;t mean completely cutting contact with them. There are lots of <strong>different video calling programs that are suitable for a variety of different needs<\/strong>, from enterprise use to educational to casual. Poor video quality is no longer an issue; <a href=\"https:\/\/www.nkn.org\/\"><strong>NKN<\/strong><\/a><strong> uses an innovative peer to peer network connectivity system powered by blockchain<\/strong>. It motivates internet users to share network connections and utilize unused bandwidth.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video Apps Are Root Cause of Most Hacks&nbsp;<\/strong><\/h1>\n\n\n\n<p>While video calling programs provide us with the <strong>ability to connect with others <\/strong>both personally and professionally, they still have their flaws.&nbsp;<\/p>\n\n\n\n<p>One of the main problems is that <strong>video calls are the root cause of most hacks<\/strong>. Not only does this violate you on a personal level, but data hacks and breaches can be incredibly expensive.<strong> Americans lose $15 billion annually from identity theft<\/strong>, and <a href=\"https:\/\/review42.com\/hacking-statistics\/\">cybercrime will have <strong>cost the world $6 trillion by 202<\/strong><\/a><strong>1<\/strong>&#8211; which is more than the GDP of Japan.<\/p>\n\n\n\n<p>&nbsp;One way that data leaks can occur and your information can fall into the wrong hands is by cybercriminals hacking video calling. Plus, it takes <strong>an average of 196 days to identify a data breach.<\/strong> At a time where most people and businesses are turning to video calling, which makes us vulnerable to these attacks.<\/p>\n\n\n\n<p><strong><em>Need a secure way to connect and share files? <\/em><\/strong><a href=\"https:\/\/www.nkn.org\/\"><strong><em>Check out what NKN<\/em><\/strong><\/a><strong><em> has to offer<\/em><\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>What Makes a Video Conferencing App Safe?&nbsp;<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh4.googleusercontent.com\/KLwIM3CJEeAXDjfzPkZRhDgtNiZ_OiNmonj6Sb7-0SohYA0_WiJiUHyedWKXD2HCA0YYvsh5gaxQn8WVc0AY6GIki9DaFpslVA1AaZ4hRuIjHM8eGsRv61_mS3r267rLrQ9t7dya\" alt=\"two people in face mask communicating through video\"\/><figcaption>two people in face mask communicating through video<\/figcaption><\/figure>\n\n\n\n<p>For all of the above reasons, you\u2019ll, of course, want to make sure that <strong>any video calling software is as safe as it can be.<\/strong> But what exactly do you need to look out for?<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enable Encryption by Default&nbsp;<\/h2>\n\n\n\n<p>Most video calling software is<strong> <\/strong>mainly <a href=\"https:\/\/blog.nkn.org\/encrypted-messaging-what-is-it-and-why-you-should-use-it-nkn\/\">encrypted<\/a><strong>;<\/strong> however, sometimes changes to the architecture of the programs that allow for third-party access (such as government wiretaps). When deciding on your video calling software, be sure to choose one which offers actual <strong>end-to-end encryption as default<\/strong>. In many cases, this won\u2019t be automatically applied, and instead is something you\u2019ll need to activate manually. Software that automatically <a href=\"https:\/\/dataride.nkn.org\/\">encrypts your data<\/a> is best since it avoids human error and gives you peace of mind.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Disable Most Functions for Participants&nbsp;<\/h2>\n\n\n\n<p>For large meetings or webinars, you\u2019ll want the ability to <strong>disable functions<\/strong> for most people- such as voice, presentation, the ability to change the name, etc. This allows you to invite participants who can watch but without the risk of the link falling into the wrong hands and changes being made. As the person hosting the meeting or webinar, only you need access to the main features ensuring that the program you choose offers these functionalities.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Add a Privacy Lens Cover<\/h2>\n\n\n\n<p>Finally, <strong>adding a privacy lens cover<\/strong> can be an excellent way to give you peace of mind, and ensure that if you are hacked that criminals can\u2019t see through your webcam. This could be a simple piece of <strong>removable tape over a laptop webcam lens<\/strong>, it could be a <a href=\"https:\/\/mashable.com\/article\/should-you-cover-phone-selfie-camera\/?europe=true\">phone case with a slidable camera cover<\/a>, and on newer pieces of video technology such as the Amazon Echo Show with a slider built into it which you can cover over once you\u2019re done.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Be Wary of Social Media<\/h2>\n\n\n\n<p>Something that you can do is be wary of social media. <strong>Don\u2019t use software that automatically publishes private events to social media<\/strong>, and don\u2019t manually do this yourself. Letting criminals know when you\u2019re online and which software you\u2019re using can make their job that bit easier.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Zoom Video Conferencing, What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Zoom helps businesses and organizations <strong>bring their teams together online<\/strong>. It\u2019s a<strong> cloud platform<\/strong> for video and audio conferencing, collaboration, chat, and webinars across <a href=\"https:\/\/www.nkn.org\/nMobile\/\">mobile devices<\/a>, desktops, telephones, and room systems. It was predominantly used for teleconferencing, telecommuting, and distance education, but with the lockdown restrictions, it\u2019s become widely used for casual and social communications as well. It allows video and audio calls or just audio; there\u2019s the live video feature with the ability to record sessions and watch them back later.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Zoom Safe?&nbsp;<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/theintercept.com\/2020\/03\/31\/zoom-meeting-encryption\/\">Intercept reported<\/a> that video calls were<strong> not end-to end encrypted,<\/strong> which means that a <strong>criminal hacker could capture the information either at rest <\/strong>(on your computer or Zoom\u2019s server) or as it\u2019s being transmitted from one to the other. Security researchers have also <strong>found several concerns related to vulnerabilities<\/strong>, one of which can obtain your Windows passwords, and the other two can take over a Zoom user\u2019s Mac and tap into the webcam and microphone. However, Zoom has taken accountability for many of its security and privacy problems. It has <strong>implemented the password-protecting meetings by default, added a waiting room feature to let the host select who can enter a meeting, and let users to choose which data centers the call will be routed through<\/strong>. There are additional security enhancements to the latest <strong>version 5.0<\/strong> of Zoom client, so please make sure to use the most up to date software and <a href=\"https:\/\/zoom.us\/security\">follow the latest security best practices<\/a>.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Google Hangouts Meet, What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Google Hangouts Meet, (often referred to as just \u2018Meet\u2019) is Google&#8217;s enterprise video conferencing software. This app has similarities to the video calls you can make in the free, consumer version of Hangouts- however, there are a few additional features, such as real-time captions, and<a href=\"https:\/\/support.google.com\/meet\/answer\/9308630?co=GENIE.Platform%3DDesktop&amp;hl=en\"> <strong>support for up to 250 participants and 100,000 live stream viewers<\/strong><\/a><strong>.<\/strong> It was initially a feature of Google+; however, Hangouts became a stand-alone product in 2013, when Google also began integrating features from Google+ Messenger and Google Talk into Hangouts.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Google Meet, Is it Safe?&nbsp;<\/h2>\n\n\n\n<p><strong>Hackers have infiltrated Android phones through the &#8216;Hangouts&#8217; app and other video messages<\/strong>. Right under the enormous scope of the world\u2019s most prominent search engine and continuously growing tech company, hackers exploited an <a href=\"https:\/\/bowerwebsolutions.com\/google-has-hackers-heres-how-to-protect-yourself\/\">SMS application<\/a> that\u2019s on<strong> over 950 million users\u2019 phones.<\/strong> Google has stepped up and implemented more security features; it now <strong>uses a 25-character string for meeting IDs and restricts external participants from joining a meeting 15 minutes before it starts.&nbsp;<\/strong><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Cisco WebEx Video Conferencing, What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Cisco Webex <strong>develops and sells web conferencing and videoconferencing applications. <\/strong>As well as live video and recordings, it also<strong> offers screen sharing,<\/strong> which provides an <strong>extra layer of real-time collaboration to an online meeting<\/strong>. This means you can share a screen so that participants can watch you walk through a detailed workflow or share a particular document, such as a spreadsheet.<strong> You can invite up to 100,000 people to a Webex conferenc<\/strong>e, and hosts can also stream video conferences to social media via Facebook Live for further audience reach.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Cisco WebEx Safe?&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/uk.pcmag.com\/how-to-work-from-home\/125554\/zoom-vs-webex-the-best-videoconfencing-apps-face-off-on-features\">According to PCMag<\/a>, Cisco WebEx is among the top choices for video software,&nbsp; but it\u2019s not without its faults. In October 2019, Cisco warned people about the WebEx enterprise conferencing system about an <strong>automated online attack system that would allow anyone to join in on the private meeting. <\/strong>The company has published an &#8220;<a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20191001-webex-enum\">informational advisory<\/a>&#8221; about a Cisco Webex Meetings &#8216;enumeration attack,&#8217; referring to a method where an attacker can mostly guess the numerical identifier that allows intended participants to join a Webex meeting.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Skype for Business and Microsoft, Teams What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Possibly one of the most well-known video software on the planet is Skype, and along with their standard text and video chat, they also offer Skype for Business. This is an enterprise instant<a href=\"https:\/\/blog.nkn.org\/nkn-messaging-application-survey-results\/\"> messaging<\/a> software developed by Microsoft as part of the Microsoft Office suite. <strong>The Skype for Business technology is now being replaced by Microsoft Teams, which expands on the functionality in Skype for Businesses by bringing together chats, files, and apps in an integrated app, with features that enable organizations to move faster and collaborate more efficiently.<\/strong> It could be considered the lynchpin in the Office 365 portfolio since it brings all the other products together, gets users working, and opens several lines of communication all from a single interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Skype\/Teams Safe?&nbsp;<\/h2>\n\n\n\n<p>Office 365 security is complex and can be compromised by attackers.&nbsp; <strong>It\u2019s possible to inhibit collaboration through security and configuration settings<\/strong>. Constant monitoring of Teams and Office 365 is the best way to ensure there are no active issues on your network; be proactive and eliminate stale sharing links and maintain security and visibility to sensitive data at all times.<\/p>\n\n\n\n<p><strong>Related:<\/strong><a href=\"https:\/\/blog.nkn.org\/guide-to-becoming-a-blockchain-developer-nkn\/\"><strong> Guide to Becoming a Blockchain Developer | NKN<\/strong><\/a><br><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>HouseParty, What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Houseparty is a social networking service that <strong>provides group video chatting through desktop and mobile apps<\/strong>. Users get notified when their friends are online and available for group chats. The app has been around since 2016, but for many of us, we\u2019re now only hearing about it for the first time due to the lockdown restrictions. Unlike the others so far, Houseparty isn\u2019t a business app and instead is a casual\/ fun type of software designed for friends, families, and those in long-distance relationships.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Houseparty Safe?<\/h2>\n\n\n\n<p>There are a few features of Houseparty that have raised some issues. Because<strong> friends can start conversations without any notice, you could be transported into a conversation at any time. <\/strong>If you have a lot of contacts, it\u2019s smart to be selective about which ones you put on your friend list, for most of us this would be limited to people we don\u2019t mind seeing anytime. Allowing an app to access your contacts always raises privacy concerns too. Another problem is that Houseparty doesn\u2019t tell you if someone else is recording your conversation, so be careful if you\u2019re chatting with someone you don\u2019t trust<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Google Duo, What is It?&nbsp;<\/strong><\/h1>\n\n\n\n<p>Similar to Apple&#8217;s FaceTime, WhatsApp, Messenger, and Skype, Duo is a simple video chat app that <strong>works across both iOS and Android devices <\/strong>(unlike Apple&#8217;s FaceTime, which is limited to Apple devices only). It\u2019s designed to be a fast and easy one-to-one video chat app, and despite the name &#8220;Duo,&#8221; it can also be used to make group calls. You don\u2019t need to login to your Google account since it works by phone number, and is a quick and easy software for casual use between friends.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Google Duo Safe?&nbsp;<\/h2>\n\n\n\n<p>Google\u2019s Duo offers<strong> end-to-end encryption<\/strong>, and the <strong>&#8220;Knock Knock&#8221; feature<\/strong> lets you <strong>see a live video of the caller before you accept their calls.<\/strong> Google has baked in some extremely tough security systems to make sure no-one can snoop onto your private calls stating, &#8220;We built Duo with an emphasis on privacy and security, and all Duo calls are end-to-end encrypted.&#8221;<\/p>\n\n\n\n<p><strong><em>Enjoy secure, low cost, and universally accessible connectivity with <\/em><\/strong><a href=\"https:\/\/www.nkn.org\/\"><strong><em>NKN<\/em><\/strong><\/a><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>FaceTime, What is It?<\/strong><\/h1>\n\n\n\n<p>Facetime is Apple\u2019s own video calling software, which works only with other Apple devices. <strong>It works on Wifi<\/strong>, and one significant benefit it has over your regular Phone app is that it can <strong>make free internet-based calls anywhere you have a Wi-Fi connection.<\/strong> For many years, FaceTime only supported direct, person-to-person video calls, but as of iOS 12.1, you can make group calls with FaceTime too.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Is Facetime Safe?&nbsp;<\/h2>\n\n\n\n<p>Back in 2014, <a href=\"http:\/\/images.apple.com\/iphone\/business\/docs\/iOS_Security_Feb14.pdf\">Apple published<\/a> a whitepaper on the security used in various iOS services, the section for FaceTime stated:<strong> FaceTime calls use the Apple Push Notification Service to establish an initial connection to the user\u2019s registered devices. <\/strong>The audio\/video contents of FaceTime calls are <strong>secured by end-to-end encryption, so only the receiver and center can access them, and Apple cannot decrypt the system.<\/strong> However, <strong>breaches have happened<\/strong>, and in 2019, they had to <a href=\"https:\/\/www.macworld.co.uk\/news\/iphone\/facetime-bug-hack-3691275\/\">fix an issue <\/a>that was spotted where a <strong>user could set up a group FaceTime call that enabled them to see and hear a recipient without them answering the call<\/strong>.&nbsp;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Take Home Message<\/strong><\/h1>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/lh5.googleusercontent.com\/AiWWggUBbE6zGAawChfsrNP1FCTLD49av_8nOA2BW8C38Kc5xJXB7TB-gMtiwJUuSfNBWfe0Kd_NJUkTgNT_WsHRgiSvaJIGVx-toKkJ-7ohoq1Zct6XQlxbOoWgZ7PY-eimJWr4\" alt=\"\"\/><figcaption>woman sitting down on a swinging chair&nbsp;<\/figcaption><\/figure>\n\n\n\n<p>So while excellent video software exists, it\u2019s rarely completely secure, and unfortunately, hackers can still find their way in sometimes. Be sure to secure online business meeting calls with passwords, be careful with who has your contact information, and cover the lens of your camera as an extra security measure.&nbsp;<\/p>\n\n\n\n<p><strong>Related: <\/strong><a href=\"https:\/\/blog.nkn.org\/the-history-of-youtube-2020-edition\/\"><strong>The History of YouTube \u2013 2020 Edition<\/strong><\/a><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pandemic has left all of us isolated at home. Fortunately, we have a list of video conference tools to enhance communication during this time.<\/p>\n","protected":false},"author":3,"featured_media":9158,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"mc4wp_mailchimp_campaign":[]},"categories":[867],"tags":[861,846,931,932],"acf":[],"_links":{"self":[{"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/posts\/9393"}],"collection":[{"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/comments?post=9393"}],"version-history":[{"count":0,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/posts\/9393\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/media\/9158"}],"wp:attachment":[{"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/media?parent=9393"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/categories?post=9393"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nkn.org\/ko\/wp-json\/wp\/v2\/tags?post=9393"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}