Zoom: The Privacy Issue

In this day and age, where online communication is crucial, there is all the more reason to value privacy and confidentiality of communication. Especially now, when most companies are working-from-home, sensitive and confidential information are being used and shared via online communication platforms.

One such platform is Zoom.

Zoom has made communication easier, since there is no need to make an account to use the platform. All you need is the URL of the meeting to join the video conference. They promise end-to-end encryption during video conference sessions, meaning, they are assuring the security and privacy of their platform.

However, this has been proven false. The CEO of Zoom even apologized for this misleading promises. I’ll be providing links for the information here down below, should you want to futher read into this issue.

The latest news regarding Zoom is that Zoom accounts are being sold on the black market, sometimes for free.

What is the cause of worry?

In our current situation, people are flocking the online video communication platform, creating an account on various multiple platforms in order to tend to their obligations, be it online classes for school or work meetings. Not all persons are tech-savvy enough to navigate these systems privately. Some systems do not even offer these privacy settings from the start, while some have weak security.

These people can easily fall prey to account hijacking. So what if your account gets hijacked?

Well, first there’s the inconvenience of retrieving control, or if one abandons the account, then the hassle of creating a new one.

Second there’s this unknown repercussion, that may or may not happen, like in identity theft for example. The hackers can pose as you since they are in control of your account. The havoc it can wreak can range from benign pranks to massively consequential circumstances. The problem lies on its uncertainty. It may hugely affect you or not at all. The question then is are you willing to take that risk?

So what now?

The thing is, these issues will not be resolved overnight. Hackers are adapting alongside with the ever evolving security measures put in place to prevent them. The solution is to then educate the user on how to navigate the world wide web privately.

Total anonymity may be hard to reach, but knowing which information should be kept public and private will lessen the chances of having your information stolen. This is one way to prevent problems on the event that your account gets compromised.

If your company can afford it, try to use paid services, especially if you are handling confidential and sensitive information. This alone is worth the purchase. Especially, considering how much one pays for damage control both in finance and to redeem their reputation when a breach occurs. Having paid services offers better security as well as competent customer service, since you are paying for the said service.

Do not use compromised systems, until they have actually fixed the problem. If you still need to use the platform, check your settings and set it to the most private configuration needed. Lessen the information therein, or if possible, delete your account. Also, notify your superior who still uses the platform to switch to other platforms. You’re not only helping yourself, but also other people in your team by notifying them and instilling awareness that these compromised security circumstances occurs.


Communication has been made easy by the advent evolution of human technology, but this does not necessarily mean private online communication is now better than actual human interaction. If one wants true private communication, nothing beats actual social interaction. But as of the moment, while we do not have the luxury of doing so, the next best thing is the responsible use of technology, and being in control of your data and privacy by doing your due diligence in finding out who can provide you with the most security.


Zoom Apology and Plan of Action

Zoom Accounts Sold

Zoom Explainer

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: