{"id":20309,"date":"2020-04-11T06:48:03","date_gmt":"2020-04-11T06:48:03","guid":{"rendered":"https:\/\/www.lifeandnews.com\/articles\/?p=20309"},"modified":"2020-04-16T10:48:38","modified_gmt":"2020-04-16T10:48:38","slug":"videoconferencing-keeps-people-connected-while-the-coronavirus-keeps-them-inside-but-privacy-and-security-are-far-from-perfect","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/videoconferencing-keeps-people-connected-while-the-coronavirus-keeps-them-inside-but-privacy-and-security-are-far-from-perfect\/","title":{"rendered":"Videoconferencing keeps people connected while the coronavirus keeps them inside \u2013 but privacy and security are far from perfect"},"content":{"rendered":"<p><a href=\"https:\/\/theconversation.com\/profiles\/elizabeth-stoycheff-279378\">Elizabeth Stoycheff<\/a>, <em><a href=\"https:\/\/theconversation.com\/institutions\/wayne-state-university-989\">Wayne State University<\/a><\/em><\/p>\n<p>If, before COVID-19, you were concerned about all the <a href=\"https:\/\/www.theguardian.com\/commentisfree\/2018\/mar\/28\/all-the-data-facebook-google-has-on-you-privacy\">data that technology companies had about you<\/a>, just wait. As stay-at-home orders push more professional and social activities online, it\u2019s becoming harder to remain in control.<\/p>\n<p>Look no further than Zoom, which suffered <a href=\"https:\/\/www.vox.com\/recode\/2020\/3\/31\/21201019\/zoom-coronavirus-privacy-hacks\">dual security and privacy crises<\/a> in the past few weeks. Lawsuits alleging data sharing violations and hackers have descended on the software, which has led <a href=\"https:\/\/www.cnet.com\/news\/zoom-every-security-issue-uncovered-in-the-video-chat-app\/\">Google and school districts to ban Zoom<\/a> for professional use.<\/p>\n<p>I\u2019m a researcher who investigates <a href=\"https:\/\/doi.org\/10.1177%2F1461444818801317\">how these concerns affect the use of online platforms<\/a>. The first thing to understand is that privacy and security are two different things, and they have different consequences for using videoconferencing platforms.<\/p>\n<h2>Privacy versus security<\/h2>\n<p>Privacy refers to individuals\u2019 <a href=\"https:\/\/www.un.org\/en\/universal-declaration-human-rights\/\">universal rights<\/a> to control their data. Security is how that data is protected. One or both can be compromised when using popular videoconferencing tools, leaving personal information vulnerable.<\/p>\n<p>For example, say someone signs up for a new videoconferencing platform using full name, email address and phone number. Ideally, the platform company would maintain both privacy and security, meaning the company wouldn\u2019t share that person\u2019s information outside the company, and would keep their system protected from hackers and viruses. The most private platforms, like <a href=\"https:\/\/signal.org\/\">Signal<\/a> and <a href=\"https:\/\/apps.apple.com\/us\/app\/facetime\/id1110145091\">FaceTime<\/a>, use end-to-end encryption to ensure that even the companies themselves do not have access to the contents of anyone\u2019s communication. When such systems are kept secure, they are the best communication tools to use.<\/p>\n<p>Alternatively, a company could compromise privacy but maintain security, meaning it would collect information about video calls and sell that data to a third party for marketing purposes. Many companies will include such conditions in their terms of service, <a href=\"https:\/\/doi.org\/10.1080\/1369118X.2018.1486870\">which users rarely read<\/a>. However, companies have incentive to maintain security; they don\u2019t want to be overrun with criminals or pranksters, which could damage their reputations.<\/p>\n<figure class=\"align-center \"><img src=\"https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=429&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=429&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=429&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=539&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=539&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/327021\/original\/file-20200409-122223-6hh2v4.png?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=539&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><figcaption><span class=\"caption\">Videoconferencing software mapped in terms of security and privacy protections.<\/span><br \/>\n<span class=\"attribution\"><span class=\"source\">Elizabeth Stoycheff<\/span>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/span><\/figcaption><\/figure>\n<p>Worst case is when a company surrenders both privacy and security, meaning they share personal information with third parties, and they <a href=\"https:\/\/www.cnet.com\/news\/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year\/\">fail to prevent data breaches<\/a>. Offerings from these companies are the riskiest of all digital tools, and unfortunately, they\u2019re all too common.<\/p>\n<p>Here\u2019s how some of the most popular video conferencing services stack up.<\/p>\n<h2>Videoconferencing options<\/h2>\n<p>Zoom\u2019s most updated <a href=\"https:\/\/zoom.us\/privacy\">privacy policy<\/a> states that the company \u201cdo[es] not allow third parties to use any personal data obtained from users for their own purposes, unless you consent.\u201d However, Zoom is currently facing a lawsuit alleging that it violated this agreement and <a href=\"https:\/\/www.cbsnews.com\/news\/zoom-app-personal-data-selling-facebook-lawsuit-alleges\/\">shared user data with Facebook<\/a>. The company claims that this was a security, not a privacy, breach and that it was not compensated for data sharing.<\/p>\n<p>Zoom has also come under fire for security flaws that have allowed \u201c<a href=\"https:\/\/www.cbsnews.com\/news\/zoom-video-conferencing-feature-freeze-security-flaws\/\">Zoom-bombers<\/a>\u201d to intrude on personal calls, often using profane or obnoxious content. The company admitted that it has <a href=\"https:\/\/www.cbsnews.com\/news\/zoom-video-conferencing-feature-freeze-security-flaws\/\">fallen short on protecting users\u2019 privacy and security<\/a> and is working to fix the problems.<\/p>\n<p>Microsoft Teams\u2019 <a href=\"https:\/\/privacy.microsoft.com\/en-us\/privacystatement\">privacy policy<\/a> leaves no questions. It explicitly states that it \u201ccollects data from you, through our interactions with you and through our products.\u201d It is upfront about using this information to market to users, personalize their experiences and even participate in legal investigations. In other words, make no presumptions of privacy here \u2013 all personal data on the platform is fair game.<\/p>\n<p>To differentiate its security from Zoom, Microsoft\u2019s Teams has implemented <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/sign-in-teams\">dual-factor authentication<\/a>, meaning passwords are not enough. Users need to also enter email or text codes to log in. The Microsoft family of software \u2013 though not Teams specifically \u2013 confronted a number of security problems this year, including a <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2020\/01\/22\/microsoft-security-shocker-as-250-million-customer-records-exposed-online\/#6b52e7eb4d1b\">breach of its customer service center<\/a> that exposed 14 years of information. The jury is still out on whether it\u2019s a more secure alternative to Zoom.<\/p>\n<p>Unlike Zoom and Teams, Webex offers hosts the option of <a href=\"https:\/\/help.webex.com\/en-us\/WBX44739\/What-Does-End-to-End-Encryption-Do\">end-to-end encryption<\/a>, meaning only the sender of a message and its recipient have access to the data within. This is a strong privacy feature, but it\u2019s elective and tends to limit the usefulness of the tool.<\/p>\n<p>Webex is not immune to security breaches, but the difference between this company and their competitors is their transparency and quick patches. The platform actively maintains a <a href=\"https:\/\/tools.cisco.com\/security\/center\/publicationListing.x?product=Cisco&amp;keyword=webex&amp;sort=-day_sir#%7EVulnerabilities\">public list of vulnerabilities<\/a>, which documents how the company has resolved them.<\/p>\n<figure class=\"align-center \"><img src=\"https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip\" sizes=\"(min-width: 1466px) 754px, (max-width: 599px) 100vw, (min-width: 600px) 600px, 237px\" srcset=\"https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=1 600w, https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=2 1200w, https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=600&amp;h=450&amp;fit=crop&amp;dpr=3 1800w, https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=1 754w, https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=30&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=2 1508w, https:\/\/images.theconversation.com\/files\/327034\/original\/file-20200409-165427-jnt7sf.jpg?ixlib=rb-1.1.0&amp;q=15&amp;auto=format&amp;w=754&amp;h=566&amp;fit=crop&amp;dpr=3 2262w\" alt=\"\" \/><figcaption><span class=\"caption\">Zoom\u2019s virtual waiting room, which prevents participants from joining a meeting without the host\u2019s permission, is now on by default.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"https:\/\/flickr.com\/photos\/pswansen\/3063800085\/in\/photolist-5EJM2p-JPi3FZ-7t2yqf-8ZXGeW-2g3JYxh-eiVy7g-e4aj2K-myiYTZ-CmrmN-LavrPD-4SeE5A-9Fa1B7-CGE2MP-2hik4n2-28xqcvB-27ay7yw-zZVya-59uCCp-KUGD7U-5SS6g4-2biAdP8-ssKBF-25gDuEE-gqR2w-yJvxX-jP4Bw-8GtNWR-8ET3eb-8ESVQE-53xshM-7yuQFL-n79k9-8ET6e1-MaG4Q-GUP3p-GPp44-tLRgh-24GP516-EsqKvb-ps2H3X-Nfx8dX-nLDitH-b4PyCK-bgHNJT-dFrFn5-noXW3G-MBipMs-FfZEbr-4Y5poN-2gP6pLo\">Paul Swansen\/Flickr<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/\">CC BY-ND<\/a><\/span><\/figcaption><\/figure>\n<p>Skype has a privacy problem. It <a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/is-skype-safe-and-secure-what-are-the-alternatives\/\">shares user data<\/a> with third parties, across the entire Microsoft family, and even with law enforcement when asked. In a benign effort to improve customer service, it <a href=\"https:\/\/www.theguardian.com\/technology\/2020\/jan\/10\/skype-audio-graded-by-workers-in-china-with-no-security-measures\">allowed employees to access recordings of Skype conversations<\/a> from their personal computers over a period of several years. Such tasks have since been transferred to a secure facility, but it doesn\u2019t change the fact that if you\u2019ve used Skype lately, your privacy has been compromised.<\/p>\n<p>Like Teams, Skype uses dual-factor authentication but it was also likely compromised in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/sign-in-teams\">massive Microsoft customer service breach<\/a> earlier this year.<\/p>\n<p>Long before Facebook acquired WhatsApp, the video chat service provided <a href=\"https:\/\/faq.whatsapp.com\/en\/android\/28030015\/\">end-to-end encryption<\/a> on calls and messages. The privacy of chats here are, and always have been, protected.<\/p>\n<p>However, WhatsApp suffered a very public security breach when Jeff Bezos\u2019 personal messages were compromised by spyware and leaked. That was one of <a href=\"https:\/\/www.businessinsider.com\/jeff-bezos-hack-whatsapp-disclosed-security-flaws-last-year-ft-2020-1\">12 vulnerabilities<\/a> the platform faced last year.<\/p>\n<p>Apple\u2019s FaceTime also boasts <a href=\"https:\/\/www.apple.com\/privacy\/features\/\">end-to-end protections<\/a>, and the company has upheld its commitment to privacy by <a href=\"https:\/\/www.npr.org\/sections\/thetwo-way\/2016\/02\/25\/468158520\/why-apple-says-it-wont-help-unlock-that-iphone-in-5-key-quotes\">refusing requests from the FBI<\/a> to access user devices. It\u2019s positioning itself as a steward of user privacy.<\/p>\n<p>Like other services, FaceTime has been susceptible to occasional security hacks. In early 2019, users reported a <a href=\"https:\/\/www.npr.org\/2019\/01\/29\/689581417\/apple-disables-group-facetime-after-security-flaw-let-callers-secretly-eavesdrop\">security glitch in its group calls<\/a> where recipients could hear and see callers before answering. The feature was disabled and patched, and the service has been without a major incident since.<\/p>\n<h2>Settings and choices<\/h2>\n<p>Across all these platforms, people should use complex passwords, turn on enhanced security features, like the use of <a href=\"https:\/\/support.zoom.us\/hc\/en-us\/articles\/115000332726-Waiting-Room\">waiting rooms<\/a> and <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoftteams\/manage-channel-moderation-in-teams\">channel moderation<\/a>, and make sure conferences are restricted to intended guests. It\u2019s also important to consider what can be seen on camera, like a loan statement pinned to a bulletin board or an envelope with a home address visible. Try videoconferencing in front of a neutral wall or using <a href=\"https:\/\/support.skype.com\/en\/faq\/FA34896\/what-is-background-blur-in-skype\">blurred<\/a> or <a href=\"https:\/\/office365itpros.com\/2020\/04\/06\/teams-meeting-background-image\/\">customized<\/a> backdrops to keep the home environment off camera.<\/p>\n<p>There\u2019s still room in the market for more reliably secure, private videoconferencing systems. But in the meantime, not all communication requires the same levels of privacy and security. People might not care much if marketers or even pranksters crash their G-rated happy hours. But confidential client meetings and remote health care consultations are another matter. The companies\u2019 offerings and track records, outlined here, should help people choose the videoconferencing tool that best balances usefulness with privacy and security.<\/p>\n<p>[<em>Get facts about coronavirus and the latest research.<\/em> <a href=\"https:\/\/theconversation.com\/us\/newsletters?utm_source=TCUS&amp;utm_medium=inline-link&amp;utm_campaign=newsletter-text&amp;utm_content=upper-coronavirus-facts\">Sign up for The Conversation\u2019s newsletter.<\/a>]<!-- Below is The Conversation's page counter tag. Please DO NOT REMOVE. --><img loading=\"lazy\" style=\"border: none !important; box-shadow: none !important; margin: 0 !important; max-height: 1px !important; max-width: 1px !important; min-height: 1px !important; min-width: 1px !important; opacity: 0 !important; outline: none !important; padding: 0 !important; text-shadow: none !important;\" src=\"https:\/\/counter.theconversation.com\/content\/135799\/count.gif?distributor=republish-lightbox-basic\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><!-- End of code. If you don't see any code above, please get new code from the Advanced tab after you click the republish button. The page counter does not collect any personal data. More info: https:\/\/theconversation.com\/republishing-guidelines --><\/p>\n<p><a href=\"https:\/\/theconversation.com\/profiles\/elizabeth-stoycheff-279378\">Elizabeth Stoycheff<\/a>, Associate Professor of Communication, <em><a href=\"https:\/\/theconversation.com\/institutions\/wayne-state-university-989\">Wayne State University<\/a><\/em><\/p>\n<p>This article is republished from <a href=\"https:\/\/theconversation.com\">The Conversation<\/a> under a Creative Commons license. Read the <a href=\"https:\/\/theconversation.com\/videoconferencing-keeps-people-connected-while-the-coronavirus-keeps-them-inside-but-privacy-and-security-are-far-from-perfect-135799\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Elizabeth Stoycheff, Wayne State University If, before COVID-19, you were concerned about all the data that technology companies had about you, just wait. As stay-at-home orders push more professional and social activities online, it\u2019s becoming harder to remain in control. Look no further than Zoom, which suffered dual security and privacy crises in the past [&hellip;]<\/p>\n","protected":false},"author":44,"featured_media":20310,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[8],"tags":[7559,7689,612,7675,7928,549,7598,7775,881,7925,4151,2288,525,7633,240,7924,2290,7927,7926,7929],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/20309"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/44"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=20309"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/20309\/revisions"}],"predecessor-version":[{"id":20358,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/20309\/revisions\/20358"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/20310"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=20309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=20309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=20309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}