issues
search
zoom
/
zoom-e2e-whitepaper
Zoom Cryptography Whitepaper
Other
549
stars
36
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
zoom account
#62
senthil1979-spec
opened
3 months ago
1
my zoom account is not working
#61
senthil1979-spec
opened
3 months ago
0
Zoom disabled screenshare on Arch Linux
#60
bquast
closed
1 year ago
1
v3.3
#59
AMarcedone
closed
2 years ago
0
Cool project!
#58
sokarax
closed
2 years ago
0
v3.2
#57
AMarcedone
closed
3 years ago
0
v3.1
#56
AMarcedone
closed
3 years ago
0
AES GCM IV usage limit and selection
#55
vladionescu
closed
2 years ago
2
Fix typo: provide provide
#54
qsphan
closed
3 years ago
1
How does E2E prevent a malicious Zoom server from masquerading as the meeting leader?
#53
fefrei
closed
3 years ago
2
Typo in 3.5.2 Authenticated Public-Key Encryption
#52
franziskuskiefer
closed
3 years ago
2
Paper version 3
#51
AMarcedone
closed
3 years ago
0
Bizarre Design Choices
#50
soatok
closed
4 years ago
1
Paper version 2.3
#49
AMarcedone
closed
4 years ago
0
Zoom - Compromised devices
#48
kiranszone
closed
4 years ago
2
Certificate Pinning
#47
kiranszone
closed
4 years ago
1
Zoom and FIPS certified Hardware Security Module
#46
kiranszone
closed
4 years ago
2
Zoom - Regulatory requirements
#45
kiranszone
closed
4 years ago
1
Cryptography collisions
#44
kiranszone
closed
4 years ago
1
Identities are signed by IDP
#43
kiranszone
closed
4 years ago
1
Local key security that don't have hardware based keychain
#42
kiranszone
closed
4 years ago
5
Local Key Security for shared device use case
#41
kiranszone
closed
4 years ago
2
zoom.cn and zoom.us
#40
hilt86
closed
4 years ago
3
XSalsa20 explanation
#39
andrewaeva
closed
4 years ago
1
Who is Lea Kissner?
#38
rkulagowski
closed
4 years ago
2
Table of contents
#37
theroysamuel
closed
4 years ago
1
Paper version 2
#36
maxtaco
closed
4 years ago
0
Typo, section 6
#35
rkulagowski
closed
4 years ago
1
Typo, section 3.8.4
#34
rkulagowski
closed
4 years ago
1
Typo, section 3.8.1
#33
rkulagowski
closed
4 years ago
1
Grammatical error; section 3.6
#32
rkulagowski
closed
4 years ago
1
How to Establish the Root of Trust in Zoom’s E2E Protocol? Reliably, Securely and Conveniently Validating the Meeting Security Code via Speech-to-Text Transcription
#31
saxenauab
closed
4 years ago
4
A hodgepodge of clarification questions/nits
#30
AnnaKornfeldSimpson
closed
4 years ago
1
Trade-offs between stronger identity and privacy / respect
#29
AnnaKornfeldSimpson
closed
4 years ago
1
Alternatives to proprietary key management
#28
anonyomelabs
closed
4 years ago
1
Nice work!
#27
rjkrish
closed
4 years ago
1
typo: section 3.8.1
#26
MichaelTJones
closed
4 years ago
1
Some feedback on whitepaper
#25
jonnadul
closed
4 years ago
1
Is the leader ephemeral key supposed to be the one hashed to produce the Meeting Security Code?
#24
dconnolly
closed
4 years ago
3
Consider related work like Matrix / Signal / Double Rachet
#23
nealmcb
closed
4 years ago
1
Clarify availability of upgrades to Zoom users.
#22
HarleyLorenzGeiger
closed
4 years ago
2
Comments on white paper phases
#21
kray543
closed
4 years ago
1
P-384 (FIPS certified crypto) downgrade noted in the UI?
#20
todb-r7
closed
4 years ago
3
Protecting Children Online
#19
hanyfarid
closed
4 years ago
2
Securing of Private and ephemeral Private Keys
#18
sgel83
closed
4 years ago
1
The author list does not state who Lea Kissner is affiliated with
#17
nzall
closed
4 years ago
2
Fix typo: don't try to parse sk in Verify
#16
real-or-random
closed
4 years ago
1
PKi needs to be stored to and fetched from key server
#15
nickxiao-zoom
closed
4 years ago
1
Clarify user indices
#14
real-or-random
closed
4 years ago
3
Strong unforgeability of signatures
#13
real-or-random
closed
4 years ago
1
Next