CEO Eric S Yuan posted a blog post that Zoom addresses the list of security problems that it recently posed and vowed to commit its efforts to proactively find fix and solve ongoing issues over the next 90 days by freezing app changes.
Yuan describes how the organization responded to huge user growth. Zoom’s usage figures have never been shared before, but Yuan reveals that the service had an average of 10 million users daily in December. “Over 200 million members in meetings were exceeded in March of this year, both free and charged,” Yuan said.
In his blog post, Yuan emphasized that Zoom expanded in March to over 200 million daily users from 10 million daily users in December. More than 90,000 schools in 20 countries around the world have since used the program as a result of the coronavirus pandemic.
All this indicates that the video conferencing market is increasingly growing. However, this development has exposed several safety concerns.
Zoom Privacy And Security Issues
Zoom was initially developed for corporate customers with comprehensive IT support and “full safety checks,” says Yuan. In recent years, however, this pattern has changed especially as a result of the epidemic that has affected almost every major nation in the world.
The update and more specifically the rise in usage has exposed many lapses since the application was first developed. Zoom sought to curb the users ‘indignation by immediately addressing issues such as why while people were not logging in to their media accounts, exchanging data with Facebook could be discovered.
It also revised its privacy policies and remembered and apologized for the false end-to-end cryptography argument only earlier this week.
Zoom is now committed to releasing a transparency study to disclose the amount of law enforcement and customer access demands from governments. Digital rights organizations have asked Zoom to allow this.
Zoom also enhances its bug bounty program, consults with other company chief security officers and uses white box intrusion testing to find other security vulnerabilities.