Zoom Logo
Image Credit: Zoom

As the world is adapting to changes due to COVID – 19, for both work and personal needs, so are various industries. Some are experiencing unprecedented losses while others are seeing spikes never before dreamed of. One such industry experiencing said increase usage is video conferencing. As broadband and cellular bandwidth have expanded so too has the number of platforms for these type of services. Webinar, Video and Web, conferencing company Zoom has recently come under fire for its alleged use of private user data.

Business Insider has reported on a class action suit that was just filed on Monday. The person that filed the suit alleges that Zoom has failed to properly safeguards personal information. In particular it was revealed last week that their iOS version is sending out analytics data. A company known both analytic data sharing, and data leaks, Facebook, could be the recipient.

From the filed document,

” 2. Zoom, however, has failed to properly safeguard the personal information of the increasing millions of users of its software application (“Zoom App”) and video conferencing platform. Upon installing or upon each opening of the Zoom App, Zoom collects the personal information of its users and discloses, without adequate notice or authorization, this personal information to third parties, including Facebook, Inc. (“Facebook”), invading the privacy of millions of users.”

This type data access happens due to that many apps who integrate Facebook’s SDK. Their SDK is used in order to allow users to use features such as logging in with their Facebook account. A statement from their blog was posted on March 27th in response to the report about the iOS app.

“We originally implemented the “Login with Facebook” feature using the Facebook SDK for iOS (Software Development Kit) in order to provide our users with another convenient way to access our platform. However, we were made aware on Wednesday, March 25, 2020, that the Facebook SDK was collecting device information unnecessary for us to provide our services. The information collected by the Facebook SDK did not include information and activities related to meetings such as attendees, names, notes, etc., but rather included information about devices such as the mobile OS type and version, the device time zone, device OS, device model and carrier, screen size, processor cores, and disk space. “

It goes on to explain changes implemented in addressing this issue. They have removed the Facebook SDK in the iOS client. Even though it is removed users will still be able to login to their FB account thru their browser.

Don’t Miss Out on More FPS Review Content!

Our weekly newsletter includes a recap of our reviews and a run down of the most popular tech news that we published.

Peter Brosdahl

As a child of the 70’s I was part of the many who became enthralled by the video arcade invasion of the 1980’s. Saving money from various odd jobs I purchased my first computer from a friend of my...

Join the Conversation

5 Comments

  1. I get protecting privacy and all that shit but collecting generic hardware data is far from a privacy breech… at least for the users. Maybe Apple wants to get in on this? lol

  2. [QUOTE=”xGryfter, post: 11365, member: 93″]
    I get protecting privacy and all that shit but collecting generic hardware data is far from a privacy breech… at least for the users. Maybe Apple wants to get in on this? lol
    [/QUOTE]
    Hardware data creates a finger print of you that can be used to track you easier through the web. If I know display resolution, cpu type and speed, memory amount, plus mobo or ethernet port type I can ignore most of the noise.

    Display resolution is one method used to identify people in tor.

  3. [QUOTE=”_k_, post: 11366, member: 91″]
    Hardware data creates a finger print of you that can be used to track you easier through the web. If I know display resolution, cpu type and speed, memory amount, plus mobo or ethernet port type I can ignore most of the noise.

    Display resolution is one method used to identify people in tor.
    [/QUOTE]

    That is interesting. So using a more generic resolution means you’re less likely to be singled out? Huh… I never considered that. Then again I’m not a TOR user.

  4. [QUOTE=”Grimlakin, post: 11367, member: 215″]
    That is interesting. So using a more generic resolution means you’re less likely to be singled out? Huh… I never considered that. Then again I’m not a TOR user.
    [/QUOTE]
    It isnt just TOR but that is a hard lesson they learned through that network. Generally you have to leak resolution to websites. This means odd resolutions make you stand out or if they are looking for activity from a specific user they can piece together you are using three different devices on a specific webpage, two different computers(1080p and 4k) plus one mobile(redirect to mobile site with some 480 rez).

    Your personal timing habits, hardware and data request create a very specific blueprint if you can piece the data together a little. FPS account post about installing GPU water block, a youtube account starts watching videos about that block at the same time, a new connection to FPS post success. Now we can guess the user has 1 computer possibly two, possibly a phone, we know two of their accounts and what region they live in due to language and being awake. If we can pull more information on what type of hardware we can start combing data from other sources to learn more accounts, more hardware, where they go and where they work.

Leave a comment