Zoom admits calls got 'mistakenly' routed through China
Zoom founder and CEO Eric Yuan.
- Zoom has admitted that some call data was routed through China for non-China users.
- CEO Eric Yuan said the calls were routed "mistakenly" after the company ramped up capacity to cope with a huge increase in demand.
- Separately, researchers at Toronto's Citizen Lab found Zoom used encryption keys issued via servers in China, raising further surveillance worries.
- China does not enforce strict data privacy laws and could conceivably demand that Zoom decrypt calls, they said.
- Visit Business Insider's homepage for more stories.
Zoom's ongoing security woes just won't let up.
The video conferencing provider has admitted that some non-China users had their calls routed through China.
In a statement late Friday, Zoom CEO Eric Yuan admitted to mistakenly routing calls via China.
"In our urgency to come to the aid of people around the world during this unprecedented pandemic, we added server capacity and deployed it quickly - starting in China, where the outbreak began," Yuan said. "In that process, we failed to fully implement our usual geo-fencing best practices. As a result, it is possible certain meetings were allowed to connect to systems in China, where they should not have been able to connect."
He did not say how many users were affected.
During spells of heavy traffic, the video-conferencing service shifts traffic to the nearest data center with the largest available capacity - but Zoom's data centers in China aren't supposed to be used to reroute non-Chinese users' calls.
This is largely due to privacy concerns: China does not enforce strict data privacy laws and could conceivably demand that Zoom decrypt the contents of encrypted calls.
Separately, researchers at the University of Toronto also found Zoom's encryption used keys issued via servers in China, even when call participants were outside of China.
They wrote: "During a test of a Zoom meeting with two users, one in the United States and one in Canada, we found that the AES-128 key for conference encryption and decryption was sent to one of the participants over TLS from a Zoom server apparently located in Beijing, 22.214.171.124."
They added: "A company primarily catering to North American clients that sometimes distributes encryption keys through servers in China is potentially concerning, given that Zoom may be legally obligated to disclose these keys to authorities in China."
The researchers noted that Zoom has some 700 employees in China, across several Chinese subsidiaries.
Zoom has faced multiple high-profile security issues in recent weeks as it struggles to cope with an unprecedented surge in traffic and new users.
Zoom did not immediately respond to Business Insider's request for comment and clarification.
- How OnlyFans star Riley Reid plans to 'immortalize' herself using AI
- A leading supplement researcher says she doesn't take any — because she's getting what she needs from her vegan diet
- Mattel rolled out a Barbie to honor a late Cherokee Nation chief with a language error on the box that says 'chicken' instead of 'Cherokee'
- Over 100 websites blocked for facilitating organised illegal investments
- WagonR to Creta – Top selling cars in India in November
- Bollywood royalty shine at star-studded premiere of 'The Archies'
- Chatbots hallucinate and get confused, says Jio Haptik which is ‘training’ them
- Hindustan Zinc board approves dividend of Rs 2,535.19 crore