1 Matching Annotations
- Apr 2020
Thousands of enterprises around the world have done exhaustive security reviews of our user, network, and data center layers and confidently selected Zoom for complete deployment.
This doesn't really account for the fact that Zoom have committed some atrociously heinous acts, such as (and not limited to):
- Abuse how installation works on macOS
- Claiming to support end-to-end encryption while not doing that and then, shadily inventing a nomenclature that steers away from standards
- Installing a web server on your Mac that Apple had to build a tool to erase