1 / 6

Zoom Acquires Keybase to Add End-to-End Encryption

Zoom will make full end-to-end encryption available as an optional feature for premium members. <br><br>Zoom recently acquired Keybase, a company that has been enhancing data privacy for Internet users since 2014. It offers a public-key generation and maintenance service that enables users to encrypt assets and transmissions like shared files and social media messages.<br>For More Information Visit: https://www.insideup.com/zoom-acquires-keybase-to-add-end-to-end-encryption/

Insideup
Download Presentation

Zoom Acquires Keybase to Add End-to-End Encryption

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Zoom Acquires Keybase to Add End- to-End Encryption INSIDEUP.COM

  2. Zoom recently acquired Keybase, a company that has been enhancing data privacy for Internet users since 2014. It offers a public-key generation and maintenance service that enables users to encrypt assets and transmissions like shared files and social media messages.

  3. What is end-to- end encryption? End-to-end encryption is the most reliable way to ensure that businesses communicate securely and privately online. It prevents anyone, able to gain access to the flow of information on a digital transmission line,from having access to the actual private information by encrypting messages emanating from both sides of a conversation.

  4. The benefits of end-to-end encryption over conventional “at rest” encryption are as follows: 01 02 End-to-end encryption keeps your data safe from hackerswhile in transit because no component along the full line of transmission will have access to unencrypted data. Even if your data stored on a service provider’s servers gets compromised hackers will still not be able to access the keys and decrypt your information. End-to-end encryption promotes a democratic society since it gives everyone equal right to privacy. It protects journalists and dissidents, giving individuals the right to free speech within cyber space, and shields persecuted activists from intimidation.

  5. 03 04 End-to-end encryption keeps data private and gives individuals full control over accessibility – including who reads their messages. For example, when using Gmail(without the benefit of end- to-end encryption), Google has access to every piece of intimate information you put in your emails. It can even store a copy of your emails after you delete them. As the demand for Zoom, in the wake of the Covid-19 crisis, has soared over the last few months, business users have encountered many security issues. Increased usage to support work-from- home employees highlighted Zoom’s many data privacy weaknesses.

  6. Combining Keybase’s encryption mechanism into Zoom operations, if integrated appropriately, will offer business users a higher-level of security assurance. Zoom deserves credit for how quickly it has managed to acknowledge and begun to resolve its security issues. This will blunt the impact of competing video conferencing solutions that seek to drive a wedge between personal usage of Zoom and its emerging status as a significant player in the world of business communications. INSIDEUP.COM

More Related