Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
DHH
What pains me about Zoom being such sleazeballs when it comes to both security and privacy is just how unnecessary it is. They have good fundamental tech! But as the skeletons keep falling out of the closet, it’s clear that the organization is fundamentally corrupt.
Reply Retweet Like More
DHH Mar 31
Replying to @dhh
In case you weren’t caught up, here’s today’s story about them deceiving people into thinking it’s end-to-end encrypted when it’s not.
Reply Retweet Like
DHH Mar 31
Replying to @dhh
Here’s how they’re abusing the OSX installer to avoid need you to authorize the installation (a good malware trick).
Reply Retweet Like
DHH Mar 31
Replying to @dhh
Here’s another example from just last year where they created a security hole in OSX so bad Apple had to issue an operating system patch. Again, not merely by mistake, but out of malice to sidestep reasonable OS protections.
Reply Retweet Like
DHH Mar 31
Replying to @dhh
And now that Zoom has taught everyone just to click on native installers that work like malware, surprise, surprise, real malware is piggybacking on those habits.
Reply Retweet Like
DHH Mar 31
Replying to @dhh
And then there’s the questionable snitch feature they built to let bosses know which employees to reprimand for not paying attention to their boring presentations.
Reply Retweet Like
DHH Mar 31
Replying to @dhh
Just keeping this thread up to date with the latest, such that there's a coherent summary of the shenanigans and consequences:
Reply Retweet Like
DHH Mar 31
Replying to @dhh
Reply Retweet Like
DHH Mar 31
Replying to @dhh
Oh, and how would you like to get zoom bombed by some dude intent on playing porn during your meeting?
Reply Retweet Like
DHH Apr 1
Replying to @dhh
Or have your camera or mic taken over by hackers because Zoom left the door open when they broke into the OSX install protections.
Reply Retweet Like
DHH Apr 1
Replying to @dhh
Reply Retweet Like
DHH Apr 3
Replying to @dhh
Keeping that record going.
Reply Retweet Like
DHH Apr 3
Replying to @dhh
Yoinks. It's not just live Zoombombs, it's also all the Zoom mines left unexploded and ready to be exploited.
Reply Retweet Like
DHH Apr 3
Replying to @dhh
Oh, yeah, this was cool ☠️
Reply Retweet Like