Issues
- 1
Zoom disabled screenshare on Arch Linux
#60 opened by bquast - 2
AES GCM IV usage limit and selection
#55 opened by vladionescu - 0
Cool project!
#58 opened by sokarax - 2
- 2
How does E2E prevent a malicious Zoom server from masquerading as the meeting leader?
#53 opened by fefrei - 4
How to Establish the Root of Trust in Zoom’s E2E Protocol? Reliably, Securely and Conveniently Validating the Meeting Security Code via Speech-to-Text Transcription
#31 opened by saxenauab - 3
zoom.cn and zoom.us
#40 opened by hilt86 - 1
Zoom - Regulatory requirements
#45 opened by kiranszone - 1
Cryptography collisions
#44 opened by kiranszone - 2
- 1
Certificate Pinning
#47 opened by kiranszone - 2
Zoom - Compromised devices
#48 opened by kiranszone - 1
Identities are signed by IDP
#43 opened by kiranszone - 1
Table of contents
#37 opened by theroysamuel - 1
Bizarre Design Choices
#50 opened by soatok - 5
- 2
Local Key Security for shared device use case
#41 opened by kiranszone - 1
XSalsa20 explanation
#39 opened by andrewaeva - 2
Who is Lea Kissner?
#38 opened by rkulagowski - 2
Protecting Children Online
#19 opened by hanyfarid - 2
- 3
Mention of "Deep Fakes" without definition
#7 opened by huslage - 1
Grammatical error; section 3.6
#32 opened by rkulagowski - 1
Typo, section 3.8.1
#33 opened by rkulagowski - 1
Typo, section 3.8.4
#34 opened by rkulagowski - 1
Typo, section 6
#35 opened by rkulagowski - 3
“double up” in Section 3.5 not required for FIPS
#11 opened by rt-acumen - 3
Clarify user indices
#14 opened by real-or-random - 3
Is the leader ephemeral key supposed to be the one hashed to produce the Meeting Security Code?
#24 opened by dconnolly - 1
- 1
- 1
Alternatives to proprietary key management
#28 opened by anonyomelabs - 1
Nice work!
#27 opened by rjkrish - 1
Comments on white paper phases
#21 opened by kray543 - 1
Some feedback on whitepaper
#25 opened by jonnadul - 1
typo: section 3.8.1
#26 opened by MichaelTJones - 2
Define Trust Model of System Components
#8 opened by chelseakomlo - 3
- 2
- 2
Enhancements to Cloud Recordings
#10 opened by 0zAND1z - 1
- 1
Securing of Private and ephemeral Private Keys
#18 opened by sgel83 - 1
Clarify storage of keys in Phase 3
#12 opened by hi117 - 2
Use of frequent key rotation
#6 opened by mark-loveless - 1
- 1
- 3
- 1
- 1
Strong unforgeability of signatures
#13 opened by real-or-random - 2