Every Application Fails in Unique but Predictable Ways: A Study in Zoom(rethinksecurity.io) |
Every Application Fails in Unique but Predictable Ways: A Study in Zoom(rethinksecurity.io) |
It also helps if there's a tangible issue that end users actually see or feel. Zoombombing is an example, but it's easily prevented (unless there's an internal collaborator on the call intentionally leaking the meeting ID and password), and they can do various things to address that.
Other examples would be some sort of worm infecting computers through the Zoom client, or direct evidence that any stranger could've been or was spying on their calls undetected (rather than the more abstract China routing and E2E issues).