TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zoom rolled their own encryption scheme, transmit keys through servers in China

1248 pointsby gasullabout 5 years ago

33 comments

dangabout 5 years ago
Matthew Green&#x27;s article on this is has a thread here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22771193" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22771193</a><p>The Intercept article on it has a thread here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22767807" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22767807</a><p>It&#x27;s probably too much of a stretch to merge all these, because many comments are about specifics of those posts, and the ones that aren&#x27;t are kind of generic and so maybe not worth merging anyway (<a href="https:&#x2F;&#x2F;hn.algolia.com&#x2F;?dateRange=all&amp;page=0&amp;prefix=false&amp;query=by%3Adang%20generic%20discussion&amp;sort=byDate&amp;type=comment" rel="nofollow">https:&#x2F;&#x2F;hn.algolia.com&#x2F;?dateRange=all&amp;page=0&amp;prefix=false&amp;qu...</a>).
评论 #22774620 未加载
tptacekabout 5 years ago
The serverside key handling stuff is bad, but generally known (Zoom has features whose natural implementation require them to keep keys serverside).<p>People are dunking on Zoom for rolling their own crypto and coming up with AES-128-ECB. This is also bad, but people should be aware that it&#x27;s a lot more complicated than &quot;you can see penguins through it&quot;.<p>You can see penguins through an ECB-encrypted bitmap because discrete blocks of the bitmap image repeat, and thus have the same ciphertext, and these correspondences carry obvious meaning in a bitmap. The same is not automatically true of video or audio data with normal codecs. Aaron Toponce points out that sensor noise will likely scramble ECB ciphertexts, for instance.<p>Colm MacCárthaigh makes an even more important point, which is that it&#x27;s already very trick to reliably encrypt voice tracks, because common encoding and transmission techniques make them susceptible to traffic analysis. So, for instance, you can quickly find papers about exploiting silence suppression to make predictions about speech in an encrypted audio channel. The point here being, cryptanalytic attacks on ECB are unlikely to be anyone&#x27;s first recourse.<p>Obviously, the 128 bit AES key thing doesn&#x27;t really have any practical impact.<p>Designers should religiously avoid ECB mode, but the real danger of ECB is in interactive settings, where we as attackers get to <i>induce</i> plaintext patterns, and use chosen boundaries to isolate targeted ciphertext. Bulk video and audio transmission isn&#x27;t that kind of interactive setting. You still don&#x27;t want to read people saying that ECB is OK; it&#x27;s bad.<p>Essentially: it seems like Zoom&#x27;s cryptography is bad, but not in a way that really matters compared to brochure-level badness of non-end-to-end-encryption.
评论 #22774986 未加载
评论 #22775700 未加载
评论 #22777757 未加载
评论 #22776386 未加载
评论 #22775856 未加载
评论 #22774745 未加载
评论 #22774776 未加载
评论 #22781721 未加载
评论 #22776735 未加载
评论 #22774775 未加载
评论 #22785812 未加载
评论 #22775604 未加载
gen3about 5 years ago
This is honestly the best “Zoom is bad” summery I’ve seen so far. While I certainly believe some of the Zoom hate is blown out of proportion, this article does a good job explaining to someone who isn&#x27;t a security expert what the issues are. I&#x27;ve been getting questions about the company from family and friends, and will be forwarding this to them. Well done.
评论 #22773832 未加载
评论 #22772868 未加载
rzimmermanabout 5 years ago
Using AES in ECB mode is clearly a bad choice, but honestly it&#x27;s not that horrible for high entropy data like compressed audio&#x2F;video. I&#x27;m sure someone could prove me wrong one day, but it seems hard to extract any useful patterns out of compressed audio&#x2F;video. It does check the box of &quot;uses encryption&quot; for regulatory reasons (while missing the intent). It&#x27;s pretty egregious considering how easy this is to get right.<p>The 128-bit key is not inherently wrong if they were rotating these out during the stream. That being said, there&#x27;s no reason not to do it right and use a mode like GCM with a longer key - most hardware supports acceleration for AES-256 these days. It can actually be slower to use a 128-bit key on 64-bit systems.<p>While I respect the decision not to disclose the waiting room vulnerability, it&#x27;s pretty obvious what&#x27;s going on given the context. They probably shouldn&#x27;t have mentioned where the vulnerability is.<p>I&#x27;m honestly surprised anyone with technical knowledge thought that Zoom was actually doing end-to-end encryption given how the software works. All of the video transcoding&#x2F;downconversion is clearly happening on the server. Your client is not sending multiple compressed streams for varying connection bandwidths. That&#x27;s the main reason a lot of people like Zoom - it actually works well with dozens or hundreds of participants.
评论 #22775235 未加载
评论 #22773391 未加载
评论 #22773370 未加载
评论 #22775537 未加载
评论 #22774333 未加载
评论 #22774734 未加载
WheelsAtLargeabout 5 years ago
&quot;Zoom, a Silicon Valley-based company, appears to own three companies in China through which at least 700 employees are paid to develop Zoom’s software. This arrangement is ostensibly an effort at labor arbitrage: Zoom can avoid paying US wages while selling to US customers, thus increasing their profit margin. However, this arrangement may make Zoom responsive to pressure from Chinese authorities.&quot;<p>I&#x27;m not here to defend zoom but any and all companies that can do this have and are doing the very same thing to minimize costs. It&#x27;s not great but it&#x27;s the expected way of managing a software company in 2020. It would be hard to do business otherwise.<p>Whether it&#x27;s good or bad that&#x27;s a question that will need to be reexamined given the current situation.
thesausagekingabout 5 years ago
Given Zoom is blocked in China, what reason is there for the main key server to be there?<p>Even ignoring the appearances, for latency and the fault tolerance reasons, China is the last place you&#x27;d want to put it a critical server for an app used in the West.
评论 #22784199 未加载
NikolaeVariusabout 5 years ago
I really don&#x27;t think this counts as rolling your own crypto. They just used a weak implementation of existing methods.<p>No more rolling your own crypto than if I were to use DES.
评论 #22773358 未加载
评论 #22773400 未加载
评论 #22773300 未加载
评论 #22774758 未加载
013aabout 5 years ago
&gt; Zoom’s most recent SEC filing shows that the company (through its Chinese affiliates) employs at least 700 employees in China that work in “research and development.”<p>Wow. What could all of these people possibly be doing? It can&#x27;t be development and QA; what&#x27;s going on over there?
评论 #22773543 未加载
评论 #22773257 未加载
评论 #22773217 未加载
评论 #22773213 未加载
评论 #22774635 未加载
评论 #22773306 未加载
评论 #22773161 未加载
duxupabout 5 years ago
&gt;However, this arrangement may make Zoom responsive to pressure from Chinese authorities.<p>Zoom doesn&#x27;t even have to be responsive to pressure, just a developer has to be. And they live there so yah they&#x27;ll be understandably responsive.
AshamedCaptainabout 5 years ago
Seriously, all people who are surprised about this type of news should really understand that most &quot;successful&quot; (as in, popular) tech&#x2F;.com&#x2F;SV &quot;startups&quot; these days are like this.<p>If you &quot;waste&quot; time on the real important stuff such as a good design, user security, or the like, you will lose over to a competitor who didn&#x27;t and therefore was able to spend more time on marketing.<p>If you waste your time on user privacy you will be totally crushed by that competitor whose definition of &quot;privacy&quot; was &quot;how much can I pester this user until he gives me access to his address book so I can spam his friends?&quot;.<p>I don&#x27;t think this is good. I think this is very sad. But it is what it is.<p>I still remember the Whatsapp founders coming into the jabber mailing lists with &quot;please let me configure my server&quot;-type questions, for god&#x27;s sake.
评论 #22773854 未加载
评论 #22774104 未加载
评论 #22773863 未加载
评论 #22774136 未加载
评论 #22773916 未加载
评论 #22773871 未加载
评论 #22774256 未加载
评论 #22773875 未加载
apiabout 5 years ago
Why can&#x27;t people bother to construct a minimally secure encryption system given that there are so many good documents and code examples out there?<p>I don&#x27;t mean anything with ratcheting, forward secrecy, replay protection, nonce reuse resistance, or any other bells and whistles, just basic competent symmetric encryption without gaping holes or ridiculous bizarre design choices?<p>It&#x27;s not hard!<p>(1) Generate 12 bytes of random nonce using a good secure random source, prepend to message.<p>(2) Use nonce to initialize AES-GCM.<p>(3) Run it through AES-GCM, append tag.<p>(4) Done.<p>That&#x27;s not hard and it&#x27;s secure enough for common use cases.
评论 #22791280 未加载
评论 #22773625 未加载
评论 #22773917 未加载
maestabout 5 years ago
Was this done in the interest of convenience, as most Zoom appologists have been clamining?
评论 #22773531 未加载
bedrosabout 5 years ago
always wondered why zoom.us url not zoom.com which they both own.<p>it&#x27;s basically to give the perception it&#x27;s US company and assumed trustworthy.
评论 #22775264 未加载
stefan_about 5 years ago
Keynote:<p><i>Zoom’s encryption and decryption use AES in ECB mode</i>
评论 #22773120 未加载
评论 #22773008 未加载
songshuuabout 5 years ago
Could we fix the title of this post please? There is a GULF of difference between &#x27;transmit keys through servers in China&#x27; and the actual text from the article, &quot; We suspect that keys may be distributed through these servers.&quot;<p>Implication is fine, but it should not be declarative without proof.
评论 #22773421 未加载
remarkEonabout 5 years ago
Is there any reasonable explanation for why this scheme was designed in this manner?
评论 #22773469 未加载
评论 #22773636 未加载
chvidabout 5 years ago
If I were to design a video conference platform my focus would be usability, video quality, speed.<p>Because those are the things that matters to end-users; if it gives up some security because there is a server somewhere that decrypts, converts and reencrypt the traffic then that is a trade-off but so be it if the goal is to create a popular widely used platform.
bitwizeabout 5 years ago
What&#x27;d I tell you? This is either malice, or sufficient incompetence as to be indistinguishable from malice.
dstrootabout 5 years ago
Zoom deserves a lot of animosity for its <i>privacy</i> issues like sharing data with Facebook.<p>On the other hand I am mystified by all the security hype. Yes I might be able to guess a Zoom meeting ID, just as if I might guess your phone number and prank call you. In a Zoom meeting <i>you can see who is connected</i>. In the old days of conference calls do you remember asking “who’s on the line?”. What are you talking about that requires encryption?<p>If so there are tools for that - signal, etc.
评论 #22773137 未加载
评论 #22773308 未加载
评论 #22784400 未加载
3xblahabout 5 years ago
Just out of curiousity I decided to check for a particular representation on the Zoom website. There must be some &quot;magic&quot; in these words because so many tech companies use them.<p>&quot;<i>We take security seriously</i> and we are proud to exceed industry standards when it comes to your organizations communications.&quot;<p><a href="https:&#x2F;&#x2F;zoom.us&#x2F;security" rel="nofollow">https:&#x2F;&#x2F;zoom.us&#x2F;security</a>
badrabbitabout 5 years ago
Just a pet-peeve here: I am well aware if the CCP and how they run things in China as well as their hostilities against the west. But sending traffic or anything to or through China in itself is not a security risk. If the data goes through the US and you are european, whatever protocol weakness exists should also worry you because of possible network and server-side adversaries in the US.<p>&quot;China&quot; is a threat not a vulnerability is all I meant, and using it for hype-training seems dishonest.<p>I&#x27;ve had meetings with people in different companies using webex,goto meeting,skype , zoom,teams and hangouts. I found hangouts to be the most worrysome with regards to privacy (not security). A lot of the issues that keep popping up about zoom this week might also apply to the others (looking at you webex!).<p>Zoom became popular because you can see everyone&#x27;s video all at once. They had a betterr product. Vulnerabilities don&#x27;t make a product bad, how you handle them does! If anything, I would like someone to show me how the free security audit zoom received by the hype crowd this week does not make it a superior alternative (provided they continue patching it).
dangabout 5 years ago
The Intercept article about this has a thread here: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22767807" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=22767807</a>
thinkingemoteabout 5 years ago
On Ubuntu would installing Zoom via Snap be preferable than as a normal package when it comes to security &#x2F; sandboxing, should the case be that they turn evil?
评论 #22774852 未加载
someonehereabout 5 years ago
Is there any validity to the claim from earlier in the week (comments here on HN) that they Have engineers based out of China and it’s essentially tied to the CCP?
DeathArrowabout 5 years ago
I didn&#x27;t use Zoom. What advantages does it have over Microsoft Teams, Webex or Skype?
smsm42about 5 years ago
Looks like Zoom to video conference security is like Flash to web browser security.
daffyabout 5 years ago
Is it possible to use Zoom on Linux from an ordinary user without sudo rights?
评论 #22774426 未加载
评论 #22774393 未加载
jtdevabout 5 years ago
Is it possible that China is actually gleaning foreign IP from Zoom customers?
评论 #22778185 未加载
awaythrowerabout 5 years ago
And this is why you don&#x27;t use unproven apps that come out of nowhere simply because they are &quot;popular.&quot;
HashThisabout 5 years ago
Zoom has betrayed us all! Congress must require zoom to explain why they are sending encryption keys to China when all participants are USA citizens. Zoom is betraying USA citizens and their customers. We must pressure USA zoom execs to explain exactly why they are doing this.
737minabout 5 years ago
A Chinese founder cooperating with Chinese government is not something to be critical about, there is different political perspective.
pvijehabout 5 years ago
<a href="https:&#x2F;&#x2F;classicprogrammerpaintings.com&#x2F;post&#x2F;148027314949&#x2F;we-rolled-our-own-crypto-pieter-bruegel-the" rel="nofollow">https:&#x2F;&#x2F;classicprogrammerpaintings.com&#x2F;post&#x2F;148027314949&#x2F;we-...</a>
tibbydudezaabout 5 years ago
Zoom just works great ... just focus on making a better product (aggh Google Hangouts) than hyping up the hysteria by adding China to the mix.<p>It is rather suspicious to see all the articles of late.
评论 #22774645 未加载