474
submitted 1 year ago* (last edited 1 year ago) by aranym@lemmy.name to c/technology@beehaw.org

Relevant text:

10.4 Customer License Grant. You agree to grant and hereby grant Zoom a perpetual, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license and all other rights required or necessary to redistribute, publish, import, access, use, store, transmit, review, disclose, preserve, extract, modify, reproduce, share, use, display, copy, distribute, translate, transcribe, create derivative works, and process Customer Content and to perform all acts with respect to the Customer Content: (i) as may be necessary for Zoom to provide the Services to you, including to support the Services; (ii) for the purpose of product and service development, marketing, analytics, quality assurance, machine learning, artificial intelligence, training, testing, improvement of the Services, Software, or Zoom’s other products, services, and software, or any combination thereof; and (iii) for any other purpose relating to any use or other act permitted in accordance with Section 10.3. If you have any Proprietary Rights in or to Service Generated Data or Aggregated Anonymous Data, you hereby grant Zoom a perpetual, irrevocable, worldwide, non-exclusive, royalty-free, sublicensable, and transferable license and all other rights required or necessary to enable Zoom to exercise its rights pertaining to Service Generated Data and Aggregated Anonymous Data, as the case may be, in accordance with this Agreement.

you are viewing a single comment's thread
view the rest of the comments
[-] intensely_human@lemm.ee 13 points 1 year ago

Does that imply Zoom is not end to end encrypted?

[-] aranym@lemmy.name 18 points 1 year ago* (last edited 1 year ago)

It never is by default. In fact, they got in a bit of a fiasco early on (before their current E2EE implementation) for using the term "end to end encrypted" after it was revealed they were simply referring to TLS.

[-] intensely_human@lemm.ee 6 points 1 year ago

huh. It’s not even misleading it’s just plain false. TLS doesn’t operate at the application layer, it operates at the Transport Layer. End to end means Application Level encryption.

this post was submitted on 06 Aug 2023
474 points (100.0% liked)

Technology

37745 readers
310 users here now

A nice place to discuss rumors, happenings, innovations, and challenges in the technology sphere. We also welcome discussions on the intersections of technology and society. If it’s technological news or discussion of technology, it probably belongs here.

Remember the overriding ethos on Beehaw: Be(e) Nice. Each user you encounter here is a person, and should be treated with kindness (even if they’re wrong, or use a Linux distro you don’t like). Personal attacks will not be tolerated.

Subcommunities on Beehaw:


This community's icon was made by Aaron Schneider, under the CC-BY-NC-SA 4.0 license.

founded 2 years ago
MODERATORS