4 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
The article critiques Zoom's privacy practices and compares them to more secure alternatives like Jitsi. It highlights the risks of using Zoom, including data collection and lack of transparency, while advocating for better security and privacy in online communications.
If you do, here's more
The article criticizes Zoom's security practices and contrasts them with Jitsi, an open-source video conferencing platform. The author points out that while Zoom claims to offer end-to-end encryption, it fails to provide transparency by not sharing its source code. The piece highlights the changing landscape of data privacy regulations, suggesting that if health insurance companies canβt keep records secure, software developers handling sensitive data are unlikely to do better.
The authorβs disdain for Zoom is evident, particularly its terms of service, which they argue are loaded with hidden pitfalls. The list of privacy violations includes data collection for marketing purposes, sharing personal data with third parties, and the potential for data retention despite requests for deletion. The piece emphasizes the disparity between user rights and the service's legal protections, making the statement about users maintaining ownership of their data feel hollow.
The author expresses a strong personal stance against using Zoom, advocating for a more secure, controlled environment like Jitsi. They discuss practical steps to enhance privacy, such as using virtual machines to isolate sensitive data during calls. The tone is brash and unapologetic, reflecting frustration with a culture that often overlooks data privacy in favor of convenience.
Questions about this article
No questions yet.