The dumpster fire that is Zoom’s security and privacy practices continues to rage after it emerged that Zoom’s ‘Company Directory’ feature pooled thousands of strangers together, exposing personal data.
According to a report from Motherboard
Popular video-conferencing Zoom is leaking personal information of at least thousands of users, including their email address and photo, and giving strangers the ability to attempt to start a video call with them through Zoom.
The issue lies in Zoom’s “Company Directory” setting, which automatically adds other people to a user’s lists of contacts if they signed up with an email address that shares the same domain. This can make it easier to find a specific colleague to call when the domain belongs to an individual company. But multiple Zoom users say they signed up with personal email addresses, and Zoom pooled them together with thousands of other people as if they all worked for the same company, exposing their personal information to one another.
The report cites users who created Zoom accounts and were met with the information of some 995 other people they had never met or heard of, including their names, images and mail addresses.
“By default, your Zoom contacts directory contains internal users in the same organization, who are either on the same account or who’s email address uses the same domain as yours (except for publicly used domains including gmail.com, yahoo.com, hotmail.com, etc) in the Company Directory section.”
However, as Vice has noted, Zoom seems to have forgotten about a few personal domains, notably several Dutch ISPs and their domains, xs4all.nl, dds.nl, and quicknet.nl. On Twitter, the found other instances of Dutch users reporting the issue.
@zoom_us I just had a look at the free for private use version of Zoom and registered with my private email. I now got 1000 names, email addresses and even pictures of people in the company Directory. Is this intentional? #GDPR pic.twitter.com/bw5xZIGtSE
— Jeroen J.V Lebon (@JJVLebon) March 23, 2020
The revelation is another extremely unnerving blunder in Zoom’s privacy and security practices, that have been exposed recently since the app’s surge in popularity, driven by global social distancing measures.
In the last week alone it has emerged that Zoom’s calls are not end-to-end encrypted despite several claims that they are, that Zoom was previously sending user data to Facebook even if they didn’t have Facebook accounts, a flaw it has rectified and that Zoom uses a “very shady” pre-installation protocol for macOS, the same kind used by macOS malware to bypass macOS security.
It’s important to note that as mentioned, this does not affect users with common email addresses such as Gmail, Yahoo or Hotmail accounts, however, Zoom appears to have missed enough personal email domains such that thousands of users have had their personal data shared with strangers.