You are on page 1of 7

Zoom Acquires

Keybase to Add
End- to-End
Encryption
INSIDEUP.CO
M
Zoom recently acquired
Keybase, a company that has
been enhancing data privacy
for Internet users since 2014. It
offers a public-key generation
and maintenance service that
enables users to encrypt assets
and transmissions like shared
files and social media
messages.
What is end-to-
end
encryption?
End-to-end encryption is the most reliable way
to ensure that businesses communicate
securely and privately online. It prevents
anyone, able to gain access to the flow of
information on a digital transmission line,from
having access to the actual private information
by encrypting messages emanating from both
sides of a conversation.
The benefits of end-to-end
encryption over conventional
“at rest” encryption are as
follows:
01 02
End-to-end encryption keeps your End-to-end encryption promotes a
data safe from hackerswhile in democratic society since it gives
transit because no component along everyone equal right to privacy. It
the full line of transmission will have protects journalists and dissidents,
access to unencrypted data. Even if giving individuals the right to free
your data stored on a service speech within cyber space, and shields
provider’s servers gets compromised persecuted activists from intimidation.
hackers will still not be able to
access the keys and decrypt your
information.
03 04
End-to-end encryption keeps data As the demand for Zoom, in the
private and gives individuals full wake of the Covid-19 crisis, has
control over accessibility – including soared over the last few months,
who reads their messages. For business users have encountered
example, when using Gmail(without many security issues.
the benefit of end- to-end Increased usage to support work-
encryption), Google has access to from- home employees highlighted
every piece of intimate information Zoom’s many data privacy
you put in your emails. It can even weaknesses.
store a copy of your emails after you
delete them.
Combining Keybase’s encryption mechanism into Zoom
operations, if integrated appropriately, will offer business
users a higher-level of security assurance. Zoom
deserves credit for how quickly it has managed to
acknowledge and begun to resolve its security issues.
This will blunt the impact of competing video
conferencing solutions that seek to drive a wedge
between personal usage of Zoom and its emerging status
as a significant player in the world of business
communications.

I NSIDEUP.COM

You might also like