Tagged "hacking"

Niemand hat die Absicht, eine Straftat zu begehen

Hacker*innen verwenden oft kryptografische Hashes, um (nachträglich) belegen zu können, dass sie zu einem bestimmten Zeitpunkt bestimmte Informationen über Schwachstellen erlangt haben. Ich nutze dieses Verfahren jetzt mal, um einen Schritt weiter zu gehen:

Zoom Endpoint-Security Considerations

Who put the "Zoo" in "Zoom"?

What I keep hearing these days is:

"We/I do not use Zoom for confidential conversations."

This is fine.

But what if someone does not only care about the confidentiality of a Zoom-session but also about the integrity of his or her own endpoint device? It’s not only the spoken word of a group within a Zoom session that is at stake – it is also the integrity and confidentiality of everything a conference participant has stored on their computer.