1. Intro
Welcome to Zoom!
Millions of people use Zoom to learn, connect with friends and family, collaborate with colleagues, and deliver vital services. Zoom users deserve excellent security, and Zoom is working to provide these protections in a transparent and peer-reviewed process. This document describes the cryptographic protocols powering several Zoom products and features, both upcoming and already released.
We are actively engaging in a process of consultation with multiple stakeholders, including clients, cryptography experts, and civil society. As we receive feedback, we will update this document to reflect changes in roadmap and cryptographic design.
Last updated