Secure Your Video Conferencing Tool for Interviews

Choosing the right tool for your video meetings does not have to be difficult. If you are working on sensitive matters, however, it is important to consider the tool’s security features as you critically assess the right tool for you and your team. 

Encryption and Security: What to Consider?

There are very few video conference tools available that offer end-to-end encryption. When a call is end-to-end encrypted, no uninvited party (not even the platform or company) can eavesdrop or have the ability to monitor it. 

Apple’s FaceTime, Google’s Duo, WhatsApp video and voice calls, and Wire calls are just the few that allow for end-to-end encrypted group calls, and even those are limited by number. FaceTime allows for up to 32 people. WhatsApp now allows for up to 8 people on a video or voice call — but only for mobile devices. Wire can only handle 4 people on a voice and video call. 

Even Jitsi Meet, a popular free and open video conferencing service, is not end-to-end encrypted. What these and other tools does provide is transit encryption — wherein messages that travel to and from your device to the app’s servers are protected. In the middle, your application can see unencrypted copies of your messages. This is why choosing a company that you can trust to handle your data is important. For many of those tools, you have to essentially trust the company with how they handle your data and privacy.

Zoom, GoToMeeting, BlueJeans, Skype Meetings, Google Meeting, Jitsi Meet all offer transport encryption. Jitsi Meet is offering end-to-end encryption, but only in an experimental phase. 

If you need to have a very private or sensitive meeting, maybe one of the popular tools is not for you. If you have to use a tool like Jitsi or even Zoom, make sure you have the highest form of security enabled: locking the room, adding a password, do not allow for dial-in calls.

Remember: dial-in features in GoToMeeting, Zoom, BlueJeans, Google Meet are not encrypted. When you allow for a phone caller to enter a meeting, you’re potentially allowing a telco or others to listen in.

Link to image / more reading:

Published by michelleferrier

Executive Director, Media Innovation Collaboratory; Founder, | Online Pest Control for Women Writers and Journalists;

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: