Ask HN: Why does Zoom Desktop examine all processes and arguments?
dllthomas 2021-08-17 22:45:07 +0000 UTC [ - ]
We can answer part of that with just a little more reading. What's pid 3844872?
For me, the series of queries against /proc happen from a process that, just a bit earlier, called exec. So it's not really zoom reading "all processes and arguments" but ... `pidof gnome-session`, so I guess zoom is looking for the pid of gnome-session.
To what nefarious purpose zoom intends to put this knowledge of gnome-session's pid, I can't say - I am not running gnome-session so my trail goes cold; but at least for me, for that particular run, zoom itself doesn't actually see the contents of all of those files.
thxg 2021-08-18 00:35:52 +0000 UTC [ - ]
I installed the Zoom client just to have a look for myself. The syscalls in question emanate from freshly forked processes that immediately execvp() the command `pidof` (on my system it finds it under /usr/bin, so it's the system command, not anything fishy shipped by Zoom). Actually, the command-line argument to the command is, in succession:
gnome-session
gnome-panel
gnome-shell
gnome-session-binary
ksmserver
cinnamon
cinnamon-session
mate-panel
mate-session
xfce-mcs-manage
xfce4-panel
xfce4-session
I suppose Zoom goes through the whole list on my system because it finds none of them. The fact that it stops on parent's system suggests that Zoom stops when it finds one. This hints at a very crude way to determine the desktop environment!
thxg 2021-08-18 00:43:06 +0000 UTC [ - ]
https://stackoverflow.com/questions/3376679/qt-how-to-detect...
dathinab 2021-08-18 01:47:08 +0000 UTC [ - ]
That is a good discovery.
It's probably one of the better ways to detect the running desktop environment as the user might have multiple environments installed and just uses one of them currently, as such looking for installed things doesn't work reliable.
And looking for env variables can be unreliable.
And scanning the dbug might not be that use-full either.
But I'm not sure what they use that for. (Notification daemon selection? But that wouldn't be that reliable either, theaming? I dubt it.)
But I guess even if it's just for telemetry it would be a reasonable thing to do.
dllthomas 2021-08-18 02:41:24 +0000 UTC [ - ]
jcelerier 2021-08-18 07:40:07 +0000 UTC [ - ]
I actually do that all the time. My main "work environment" is TTY0 with i3wm, but when I make nice videos/screencasts, or use Zoom for presentations I often switch to a clean and neat KDE Plasma session on TTY1.
dathinab 2021-08-19 00:31:38 +0000 UTC [ - ]
During that time I often had a "IntelliJ" only instance of X running in some TTY1, some other WM or just a raw TTY on TTY2 and a maybe crashing WM I was playing around with on TTY0 ;-)
Fun times.
xfitm3 2021-08-17 23:38:06 +0000 UTC [ - ]
acatton 2021-08-18 00:29:22 +0000 UTC [ - ]
IG_Semmelweiss 2021-08-18 01:04:16 +0000 UTC [ - ]
I should have known better.
I am glad this is getting posted because we need reminders of the reality we live in
dathinab 2021-08-18 01:50:13 +0000 UTC [ - ]
(Not that anyone seem to care.)
xenonite 2021-08-18 05:36:19 +0000 UTC [ - ]
est 2021-08-18 06:27:09 +0000 UTC [ - ]
neurostimulant 2021-08-18 06:54:57 +0000 UTC [ - ]
est 2021-08-18 13:10:35 +0000 UTC [ - ]
I also disable WebRTC.
It's a shame Google's Blink don't offer an option to turn off features.
wonnage 2021-08-18 07:49:47 +0000 UTC [ - ]
aero-glide2 2021-08-18 08:32:04 +0000 UTC [ - ]
vishho 2021-08-18 00:52:27 +0000 UTC [ - ]
Another angle for Zoom to do that, is that it is a massive Chinese spyware application, which can target users by meta data or IP, like it did by messing with the calls of activists. A bit like how anti-virus companies are sometimes charged with exfiltrating secret documents.
bowmessage 2021-08-18 01:02:37 +0000 UTC [ - ]
https://support.zoom.us/hc/en-us/articles/115000538083-Atten...
> As of April 2, 2020, we have removed the attendee attention tracker feature as part of our commitment to the security and privacy of our customers. For more background on this change and how we are pivoting during these unprecedented times, please see a note from our CEO, Eric S. Yuan.
hashhar 2021-08-18 10:40:27 +0000 UTC [ - ]
dmart 2021-08-17 23:28:32 +0000 UTC [ - ]
acatton 2021-08-18 00:18:41 +0000 UTC [ - ]
You can use hidepid=2 to prevent users from seeing other user's processes list.[1]
But I don't want my OS to ask me "do you want to allow htop to access the list of your processes" — à la Windows Vista — every time I want to run htop to see my user processes.
The issue here is closed source software with no way to inspect what they do.
If one really want to run closed source programs which were not vetted by their distro's maintainers, they should use firejail.[2]
[1] https://www.cyberciti.biz/faq/linux-hide-processes-from-othe...
OJFord 2021-08-18 07:40:40 +0000 UTC [ - ]
Why would it be every time? Say yes once to htop, no to Zoom. Sort of like Android/iOS permissions.
Or just require root. No way I'd give it to Zoom, htop maybe.
acatton 2021-08-18 08:05:52 +0000 UTC [ - ]
The security model on Linux is based on blacklist, with solutions like firejail.
Also, what's the points of these nags? Most people will just say "OK" anyway because they want to access the features they were promised.
forgotpwd16 2021-08-18 08:14:11 +0000 UTC [ - ]
acatton 2021-08-18 08:29:51 +0000 UTC [ - ]
I see it differently, for me the main issue is the fact that people run random software that were not even vetted.
If you dnf/apt install everything from the official repos of your distro, you wont have any misbehaving apps. And that model still holds.
And as I explained, other security models don't work either. People will just whitelist the app, or click "Accept" anyway, because they want the feature now! What's the point of nagging with a modal window "your random app, that you installed from a random website on the internet, which means you really want to use this specific app, is behaving in a shady manner, are you okay with this?"
bamboozled 2021-08-18 10:00:13 +0000 UTC [ - ]
How do you know this?
I hear this a lot, I've built packages myself, only because I needed them in a hurry. I never really went through the source code to make sure it's safe. Maybe others did, but I didn't, people installed the package, maybe they were hacked, who knows?
Just saying...
acatton 2021-08-18 12:34:53 +0000 UTC [ - ]
I usually do this directly on the source project, but some people in this subculture do it in their distro.
Also I'm surprised your packages landed in Debian/Fedora, because there is a review process… I'm not talking about a ppa repo or a copr repo, anybody can run that. I'm talking about packages in the official repositories. Installing software from a random ppa or copr repo is the same as curl | sudo sh, nobody vetted this.
[1] Type of bugs they report: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=792580
[2] https://www.fsf.org/blogs/community/who-actually-reads-the-c...
bamboozled 2021-08-18 14:15:18 +0000 UTC [ - ]
Thanks for sharing
OJFord 2021-08-18 10:57:58 +0000 UTC [ - ]
At least they get the choice? If they need something so badly they're happy to give it whatever permissions, fine, but at least they're aware and consented.
I don't know why you think nobody ever would decline, I and I assume many people do on mobile devices. Especially now that more recent (Android anyway) versions allow/require a sort of 'progressive' acquiring of permissions, prompt when it's needed and not before.
Apple & Google clearly think some people want to decline some of the time (and enough that it should be an option), or at least that it's a good way to deliver awareness.
gwbas1c 2021-08-18 05:29:31 +0000 UTC [ - ]
fsflover 2021-08-19 10:04:35 +0000 UTC [ - ]
swiley 2021-08-18 08:19:12 +0000 UTC [ - ]
STOP DOING THAT.
rocho 2021-08-18 14:47:19 +0000 UTC [ - ]
swiley 2021-08-18 16:52:14 +0000 UTC [ - ]
jlgaddis 2021-08-17 21:36:06 +0000 UTC [ - ]
Mounting /proc with "hidepid=2" should prevent it from seeing processes owned by other users, although it would still be able to see your processes.
Alternatively, it shouldn't be too hard to create an AppArmor profile that blocks access to /proc.
Other options might include things like SELinux, seccomp-bpf, namespaces, cgroups, etc., depending on what's available on your host.
Or you could just, you know, obliterate it from your system altogether. That's almost certainly the best option.
nonameiguess 2021-08-17 23:25:21 +0000 UTC [ - ]
Since this puts it in its own PID and mount namespace, it won't see any processes except itself and its children. You can even try not mounting /proc in the container this makes at all and see what happens.
This is effectively what flatpak does, but doing it yourself doesn't require installing flatpak.
ghostpepper 2021-08-17 23:38:13 +0000 UTC [ - ]
neurostimulant 2021-08-18 06:57:22 +0000 UTC [ - ]
hdjjhhvvhga 2021-08-17 21:41:08 +0000 UTC [ - ]
zippergz 2021-08-17 22:35:55 +0000 UTC [ - ]
eertami 2021-08-17 23:12:30 +0000 UTC [ - ]
But is the quality actually better, or is it post-processing tricks to make it seem better on commodity hardware/audio setups? If it is actually better, surely this should be measurable and there should exist evidence to support such a claim.
scubbo 2021-08-17 23:33:55 +0000 UTC [ - ]
Serious question - if the experience is the same, why does this distinction matter?
hdjjhhvvhga 2021-08-18 09:29:16 +0000 UTC [ - ]
eertami 2021-08-18 12:22:26 +0000 UTC [ - ]
neurostimulant 2021-08-18 07:01:42 +0000 UTC [ - ]
forgotpwd16 2021-08-18 07:56:27 +0000 UTC [ - ]
vbernat 2021-08-17 21:45:11 +0000 UTC [ - ]
But I am running Zoom in a Flatpak to avoid the kind of issues reported here. BTW, the same happens with Discord and it's not possible to disable it.
rocqua 2021-08-18 07:02:21 +0000 UTC [ - ]
avel 2021-08-17 21:58:17 +0000 UTC [ - ]
It's not like BlueJeans which has a web version pretty much aligned with the desktop client.
christophilus 2021-08-17 22:06:43 +0000 UTC [ - ]
Also, we’re trialing big blue button (self hosted) as an alternative, and it’s honestly pretty decent from what I can tell.
GekkePrutser 2021-08-17 22:00:13 +0000 UTC [ - ]
nsomaru 2021-08-17 22:18:32 +0000 UTC [ - ]
minitech 2021-08-17 22:06:36 +0000 UTC [ - ]
Note that this isn’t a supported configuration for systemd and will totally break it. (Which is too bad, because it’s a sensible default.)
noobermin 2021-08-18 05:36:58 +0000 UTC [ - ]
wins32767 2021-08-17 20:45:27 +0000 UTC [ - ]
_sgianelli 2021-08-17 20:49:33 +0000 UTC [ - ]
thephyber 2021-08-17 20:55:52 +0000 UTC [ - ]
One can argue about the granularity, but you can’t argue that Apple hasn’t already done something.
_sgianelli 2021-08-18 03:49:42 +0000 UTC [ - ]
uoaei 2021-08-17 20:59:14 +0000 UTC [ - ]
thephyber 2021-08-17 22:54:32 +0000 UTC [ - ]
The user chose to install an application, then had to use admin permissions to choose to give that application more access after installation.
How much additional nanny protection should a user get?
olyjohn 2021-08-17 22:46:13 +0000 UTC [ - ]
I already granted this permission to Teams on my Mac. It's not malicious now, but when an update comes out in the future, it could be, and I've already allowed it. So this whole thing feels kinda dumb. Nobody wants to manage all this shit, and nobody understands it.
Wowfunhappy 2021-08-17 22:51:30 +0000 UTC [ - ]
NoPicklez 2021-08-18 02:15:26 +0000 UTC [ - ]
The solution is partly for applications to limit their use of elevated privileges which we can't always rely on. Therefore MacOS is exposing and providing users with visibility and choice.
Wowfunhappy 2021-08-18 02:21:39 +0000 UTC [ - ]
tyingq 2021-08-17 20:53:45 +0000 UTC [ - ]
sithadmin 2021-08-17 20:47:51 +0000 UTC [ - ]
akira2501 2021-08-17 20:50:31 +0000 UTC [ - ]
jraph 2021-08-17 21:15:38 +0000 UTC [ - ]
bonzini 2021-08-17 21:58:16 +0000 UTC [ - ]
With X11 if the window manager doesn't have the relevant support you can always ask the server.
mnd999 2021-08-18 06:17:09 +0000 UTC [ - ]
yjftsjthsd-h 2021-08-17 20:50:33 +0000 UTC [ - ]
puttycat 2021-08-17 21:16:49 +0000 UTC [ - ]
formerly_proven 2021-08-17 21:21:15 +0000 UTC [ - ]
Also, screen-sharing can't be the reason, because X windows don't have anything to do with processes on the machine.
laurensr 2021-08-17 20:46:00 +0000 UTC [ - ]
nullc 2021-08-18 05:34:47 +0000 UTC [ - ]
cranekam 2021-08-18 07:01:15 +0000 UTC [ - ]
nullc 2021-08-18 15:52:30 +0000 UTC [ - ]
ben_bai 2021-08-18 07:34:46 +0000 UTC [ - ]
jagged-chisel 2021-08-17 21:08:37 +0000 UTC [ - ]
Hook the stat, openat, readlink functions within the zoom process, experiment with blocking (returning failure) based on arguments.
akira2501 2021-08-17 20:48:46 +0000 UTC [ - ]
Put it into it's own namespace, and only allow it to connect to your X11 session over TCP.
zzo38computer 2021-08-17 21:09:52 +0000 UTC [ - ]
yjftsjthsd-h 2021-08-17 21:52:16 +0000 UTC [ - ]
mishafb 2021-08-17 20:50:18 +0000 UTC [ - ]
phendrenad2 2021-08-17 20:52:25 +0000 UTC [ - ]
jraph 2021-08-17 21:06:50 +0000 UTC [ - ]
the8472 2021-08-17 21:53:44 +0000 UTC [ - ]
Firejail[0] allows cobbling together various linux sandboxing features, including namespaces which should result in an isolated proc filesystem which doesn't see the other processes. But I don't know if the default profile for zoom does that, you have to test it or write your own.
kamray23 2021-08-18 07:37:55 +0000 UTC [ - ]
Goes to show how little people trust Zoom.
als0 2021-08-17 22:01:10 +0000 UTC [ - ]
guerrilla 2021-08-17 22:01:13 +0000 UTC [ - ]
tryauuum 2021-08-17 20:46:36 +0000 UTC [ - ]
wwweston 2021-08-17 20:53:14 +0000 UTC [ - ]
nrabulinski 2021-08-17 21:14:14 +0000 UTC [ - ]
voxic11 2021-08-17 22:46:21 +0000 UTC [ - ]
account42 2021-08-19 09:26:00 +0000 UTC [ - ]
egypturnash 2021-08-17 20:55:22 +0000 UTC [ - ]
spockz 2021-08-17 21:07:11 +0000 UTC [ - ]
That is quite a difference from broadcasting the name of any binary it recognises.
delusional 2021-08-17 21:04:40 +0000 UTC [ - ]
gwbas1c 2021-08-18 02:23:11 +0000 UTC [ - ]
I once worked on a file synchronization application that would scan processes when files were locked. I don't remember if we put the process name in the UI, but we logged detailed information about the other process in case someone contacted support. (Sometimes users ran weird applications that kept files locked.) I believe we had to scan through all processes and inspect their open file handles.
I would assume some things like: Maybe there are applications that are known to cause problems for Zoom? Maybe some applications lock the camera or microphone? Maybe some applications hog the CPU and cause encoder problems?
If you really want to know more, consider decompiling zoom and/or looking at strings compiled into the binary.
dllthomas 2021-08-18 02:36:57 +0000 UTC [ - ]
gwbas1c 2021-08-18 03:18:11 +0000 UTC [ - ]
IMO, if you can't/won't reverse engineer, maybe see if you can contact Zoom support and see what they say? Obviously the support people won't know, but if you can ask the right way they might pass your question on to the developers.
For the file sync client, we got all kinds of oddball questions passed along from support to developers; and we'd make an honest effort to answer reasonable ones.
MichaelGroves 2021-08-17 21:34:20 +0000 UTC [ - ]
Do what I do: Run it on a burner computer connected to your guest network.
gwbas1c 2021-08-18 05:33:38 +0000 UTC [ - ]
Unfortunately, sound and camera tend to be sketchy in a VM.
0xbadcafebee 2021-08-17 23:59:00 +0000 UTC [ - ]
swiley 2021-08-18 08:16:00 +0000 UTC [ - ]
Stop using non-free software if you're doing anything important on that machine.
egberts 2021-08-18 11:39:17 +0000 UTC [ - ]
Zoom is probably footholding their place as to be able to inform its educator whether their students’ behavior are acceptable or are cheating.
Most probably.
mcrmonkey 2021-08-17 23:51:56 +0000 UTC [ - ]
But some of the info its reading seems a little bit too much
cough 'telemetry' cough
ayush--s 2021-08-18 14:28:23 +0000 UTC [ - ]
amelius 2021-08-17 22:27:58 +0000 UTC [ - ]
fsflover 2021-08-17 21:30:10 +0000 UTC [ - ]
I prevent it by running Zoom in a VM on Qubes OS.
ezekg 2021-08-17 22:00:37 +0000 UTC [ - ]
fsflover 2021-08-18 07:27:29 +0000 UTC [ - ]
forgotpwd16 2021-08-18 08:12:21 +0000 UTC [ - ]
MattGaiser 2021-08-17 21:10:09 +0000 UTC [ - ]
jraph 2021-08-17 21:14:27 +0000 UTC [ - ]
With X = something the other end does not need to install, like Jitsi Meet for instance
*no need to explain that's because you uninstalled it and blocked its domain on your computer.
slownews45 2021-08-17 21:56:52 +0000 UTC [ - ]
Zoom is very invasive / flexible - so it's actually somewhat hard to have it NOT work. People will suggest you try connecting on your phone or dialing in if you really can't figure it out (note that it has a fallback to browser option if you get stuck trying to start meeting as well).
I know of at least one job interview where they claimed they couldn't get zoom to run / couldn't connect - and that was basically decisive.
gwbas1c 2021-08-18 05:47:02 +0000 UTC [ - ]
I used to interview candidates via Zoom. There were quite a few who couldn't figure it out. I gave 2nd chances interviews, mostly for optics for upper management. (And because sometimes hardware breaks at the last minute.) The candidates always failed the retry interview.
At least for software development, troubleshooting a camera and mic is a pretty similar skill to what our job is on a day-to-day basis. It's also very disrespectful to make someone wait at the beginning of a meeting while you troubleshoot, especially when I'm waving my phone and sending IMs that ask the candidate to just use their phone.
But, if a candidate fell back to their phone, I appreciated that they respected my time.
travoc 2021-08-17 22:38:04 +0000 UTC [ - ]
slownews45 2021-08-17 22:53:46 +0000 UTC [ - ]
That said, a fair number of folks don't credibly have "security analysts". Unless you are interviewing / working for some sort of high security / security analyst type job the world may move on pretty quickly without you.
travoc 2021-08-17 23:34:07 +0000 UTC [ - ]
q-rews 2021-08-18 07:32:57 +0000 UTC [ - ]
fsflover 2021-08-18 07:45:25 +0000 UTC [ - ]
q-rews 2021-08-19 05:22:47 +0000 UTC [ - ]
MattGaiser 2021-08-17 21:17:21 +0000 UTC [ - ]
Although I nearly universally would be happy to skip those meetings, so…
pjc50 2021-08-17 22:03:29 +0000 UTC [ - ]
jazzyjackson 2021-08-17 21:21:57 +0000 UTC [ - ]
MattGaiser 2021-08-17 21:25:00 +0000 UTC [ - ]
jraph 2021-08-17 21:34:02 +0000 UTC [ - ]
- Resort to use Zoom in a browser, maybe from a separate profile
- If this does not work for you, use Zoom from a virtual machine (it should be possible by exporting the camera likely connected by USB to the VM)
- If you'd like to avoid a VM because it's heavy / annoying, I'm not sure there's an easy solution without learning how to use namespaces and unshare.
Additionally, and optionally:
- Gently campaign against Zoom or for a better solution internally.
dsr_ 2021-08-17 21:11:39 +0000 UTC [ - ]
elliekelly 2021-08-17 21:20:22 +0000 UTC [ - ]
agustif 2021-08-17 21:31:58 +0000 UTC [ - ]
They recover the app from your backups if available when launching. Try appCleaner or something like that, and you might need to delete it from any TimeMachine backups too, lol
GekkePrutser 2021-08-17 23:52:43 +0000 UTC [ - ]
Their attitude is so wrong. I don't understand how people still use it.
Wowfunhappy 2021-08-18 00:55:33 +0000 UTC [ - ]
By all means, use it if you feel it's necessary, but you're giving up a lot!
dsr_ 2021-08-18 12:46:22 +0000 UTC [ - ]
Figure out which one you want; Zoom is unwilling to give you both, even when you're paying them.
MattGaiser 2021-08-17 21:26:14 +0000 UTC [ - ]
dheera 2021-08-18 00:49:13 +0000 UTC [ - ]
When you click on a Zoom meeting, it will prompt you to launch xdg-open -- cancel it. Then hit launch again -- cancel the xdg-open again -- and then the "Join from browser" link should pop up after a few times.
Sometimes it tries to capture you, I had to click on trucks and trains for 15 minutes before it let me in, and then had to apologize for being 15 minutes late to the meeting.
908B64B197 2021-08-17 21:19:02 +0000 UTC [ - ]
[0] https://techcrunch.com/2020/06/11/zoom-admits-to-shutting-do...
phendrenad2 2021-08-17 20:57:37 +0000 UTC [ - ]
Maybe run it in a chroot?
andrewlevi 2021-08-17 21:57:06 +0000 UTC [ - ]
P9TXJYG0TENG 2021-08-17 22:12:06 +0000 UTC [ - ]
I didn't like that, and I spent a lot of time and effort working out various ways to keep it out of /proc (or anywhere else while I was at it- mostly with AppArmor) and ultimately ended up running it in a container with systemd-nspawn. This is still a little bit fiddly, but seems to work reliably and without any issues.
orangea 2021-08-18 01:15:10 +0000 UTC [ - ]
P9TXJYG0TENG 2021-08-18 01:29:24 +0000 UTC [ - ]
I use both these days.
lathiat 2021-08-17 22:22:10 +0000 UTC [ - ]
P9TXJYG0TENG 2021-08-17 22:45:29 +0000 UTC [ - ]
It might have been Snap. I don't like Snap.
sneak 2021-08-17 23:58:53 +0000 UTC [ - ]
You'd have to be crazy to install Zoom given their history.
kevmo 2021-08-17 22:06:26 +0000 UTC [ - ]
Shoshanna Zuboff has an excellent book on "surveillance capitalism", if you want to read more on the trend.
dllthomas 2021-08-18 00:09:41 +0000 UTC [ - ]
3r8Oltr0ziouVDM 2021-08-17 21:48:31 +0000 UTC [ - ]
ianlevesque 2021-08-17 20:43:40 +0000 UTC [ - ]
dang 2021-08-17 23:32:02 +0000 UTC [ - ]
(Of course, the greater part of this damage is done by upvoters, but they can't upvote nothing.)
ianlevesque 2021-08-18 00:33:34 +0000 UTC [ - ]
barbazoo 2021-08-17 20:53:49 +0000 UTC [ - ]
humaniania 2021-08-17 21:40:16 +0000 UTC [ - ]
miles 2021-08-17 21:04:02 +0000 UTC [ - ]
Zoom banned from New York City schools due to privacy and security flaws https://www.fastcompany.com/90486586/zoom-banned-from-new-yo...
Google Told Its Workers That They Can’t Use Zoom On Their Laptops Anymore https://www.buzzfeednews.com/article/pranavdixit/google-bans...
Elon Musk's SpaceX bans Zoom over privacy concerns https://www.reuters.com/article/us-spacex-zoom-video-commn/e...
Zoom lied to users about end-to-end encryption for years, FTC says https://arstechnica.com/tech-policy/2020/11/zoom-lied-to-use...
Zoom security issues: Here's everything that's gone wrong (so far) https://www.tomsguide.com/news/zoom-security-privacy-woes
Maybe we shouldn’t use Zoom after all https://techcrunch.com/2020/03/31/zoom-at-your-own-risk/
Attackers can use Zoom to steal users’ Windows credentials with no warning https://arstechnica.com/information-technology/2020/04/unpat...
monocasa 2021-08-17 21:37:14 +0000 UTC [ - ]
kamray23 2021-08-18 07:40:52 +0000 UTC [ - ]
monocasa 2021-08-18 09:36:24 +0000 UTC [ - ]
notwhereyouare 2021-08-17 21:05:51 +0000 UTC [ - ]
movedx 2021-08-17 22:56:13 +0000 UTC [ - ]
Thank you. These will make for some interesting reading.
99mans 2021-08-17 22:01:28 +0000 UTC [ - ]
0xbadcafebee 2021-08-17 23:55:28 +0000 UTC [ - ]
You can probably prevent it with capabilities, or selinux, or with a container. Unless you just enjoy the fashion statement of tinfoil hats, it's not worth it.
gigatexal 2021-08-17 18:45:45 +0000 UTC [ - ]
This is enough for me to remove the app and just use it in the browser.
saurik 2021-08-17 20:39:10 +0000 UTC [ - ]
dtruss
lsllc 2021-08-17 21:53:49 +0000 UTC [ - ]
MrWiffles 2021-08-18 00:46:36 +0000 UTC [ - ]
beaugunderson 2021-08-18 06:28:04 +0000 UTC [ - ]
Sadly it's a little more involved (a chroot which removes all codesigning bits) than a simple option, but I'm glad to have found a way to do it all.
aFaid7see0ni 2021-08-17 23:03:01 +0000 UTC [ - ]
Gene_Parmesan 2021-08-17 23:23:08 +0000 UTC [ - ]
That article claims that Zoom does have a feature allowing hosts to see whether people have the zoom window focused while someone is presenting, but it doesn't allow the host to actually see running processes. Note that I can't, nor do I claim to, vouch for the accuracy of the explanation in the link. Just something I found.
EMM_386 2021-08-18 00:45:45 +0000 UTC [ - ]
It used to but it was removed.
https://support.zoom.us/hc/en-us/articles/115000538083-Atten...
phgn 2021-08-17 23:06:05 +0000 UTC [ - ]
GekkePrutser 2021-08-17 21:58:36 +0000 UTC [ - ]
But if you really must, use the web version only.
If you can avoid it, jitsi is a great alternative. Much smoother video than teams and much lighter
reilly3000 2021-08-17 21:25:45 +0000 UTC [ - ]
cranekam 2021-08-17 21:41:49 +0000 UTC [ - ]
Personally I’d guess it is either some other library Zoom uses or some kind of debug info capturing system. But I don’t know work at Zoom so who knows.
woodruffw 2021-08-17 21:48:41 +0000 UTC [ - ]
dathinab 2021-08-18 01:04:14 +0000 UTC [ - ]
1. The windows manager can provide you with a list of open windows.
2. Screensharing including only sharing specific windows is a feature provided by the windows manager over standardized protocols.
3. Even knowing the processes which do have a GUI doesn't allow you to share that GUI, at least not without going through roughly the same mechanisms as mentioned in 2nd.
stinos 2021-08-18 08:41:14 +0000 UTC [ - ]
But that needs a unified way for this across window managers, does that exist?
account42 2021-08-19 08:01:00 +0000 UTC [ - ]
[0] https://specifications.freedesktop.org/wm-spec/wm-spec-1.3.h...
2021-08-18 09:32:38 +0000 UTC [ - ]
numpad0 2021-08-18 09:14:03 +0000 UTC [ - ]
2021-08-18 15:26:52 +0000 UTC [ - ]
woodruffw 2021-08-18 02:09:41 +0000 UTC [ - ]
inter_netuser 2021-08-18 06:39:39 +0000 UTC [ - ]
woodruffw 2021-08-18 15:46:11 +0000 UTC [ - ]
failuser 2021-08-18 18:59:38 +0000 UTC [ - ]
woodruffw 2021-08-18 21:30:37 +0000 UTC [ - ]
inter_netuser 2021-08-18 23:42:23 +0000 UTC [ - ]
Here is a company that does censorship-resistant P2P networking...and also....Nuclear Material Detection?
Obviously very closely related things?
https://www.clostra.com/newnode-mesh-network https://www.clostra.com/nuclear-detection-snm
woodruffw 2021-08-19 01:25:33 +0000 UTC [ - ]
cranekam 2021-08-18 11:18:53 +0000 UTC [ - ]
gmueckl 2021-08-17 22:16:42 +0000 UTC [ - ]
nonameiguess 2021-08-17 23:19:12 +0000 UTC [ - ]
That's a really stupid way to figure out if a program has a window, though, compared to just using the X11 API directly.
gmueckl 2021-08-18 00:18:23 +0000 UTC [ - ]
nonameiguess 2021-08-18 12:27:06 +0000 UTC [ - ]
woodruffw 2021-08-18 02:17:43 +0000 UTC [ - ]
IgorPartola 2021-08-18 04:38:27 +0000 UTC [ - ]
woodruffw 2021-08-18 15:20:34 +0000 UTC [ - ]
But again: extraordinarily unlikely.
thrower123 2021-08-17 22:01:25 +0000 UTC [ - ]
I can easily believe somebody just wrote a chunk of naive code that grabbed all the running processes, and it worked, and they moved on.
MereInterest 2021-08-17 23:18:20 +0000 UTC [ - ]
heavyset_go 2021-08-17 23:36:50 +0000 UTC [ - ]
You can explain away any deliberate malice or negligence using it, even when there are clear incentives to enage is such behavior, unless there's absolute evidence of malice. By then it's too late because you've already been swindled, and the principle ignores the lengths organizations will go to cover that evidence up.
TeMPOraL 2021-08-18 09:30:37 +0000 UTC [ - ]
https://news.ycombinator.com/item?id=21691282
addicted 2021-08-18 06:26:11 +0000 UTC [ - ]
propogandist 2021-08-17 22:30:27 +0000 UTC [ - ]
reilly3000 2021-08-17 22:51:25 +0000 UTC [ - ]
reilly3000 2021-08-18 09:46:42 +0000 UTC [ - ]
I did take at their privacy policy and didn't see anything that explicitly states they are collecting info about running applications. "and other" leaves room for interpretation... Regardless, my main concern after viewing this isn't that they are snooping my running processes and sending that back to home base. Its that they are openly keylogging and tracking everything under the sun, and can view every aspect of the meeting's content (audio, video, text, etc) and share it with 3rd parties like law enforcement and others.
Source: https://zoom.us/privacy#_qhklx843v2zq
> Device Information: Information about the computers, phones, and other devices people use when interacting with Zoom Products, which may include information about the speakers, microphone, camera, OS version, hard disk ID, PC name, MAC address, IP address (which may be used to infer general location at a city or country level), device attributes (like operating system version and battery level), WiFi information, and other device information (like Bluetooth signals).
> Meeting, Webinar, and Messaging Content and Context: Content generated in meetings, webinars, or messages that are hosted on Zoom Products, which may include audio, video, in-meeting messages, chat messaging content, transcriptions, written feedback, responses to polls and Q&A, and files, as well as related context, such as invitation details, meeting or chat name, or meeting agenda. Content may contain your voice and image, depending on the account owner’s settings, what you choose to share, your settings, and what you do on Zoom Products.
> Product and Website Usage: Information about how people and their devices interact with Zoom Products, such as: when participants join and leave a meeting; whether participants sent messages and who they message with; performance data; mouse movements, clicks, keystrokes or actions (such as mute/unmute or video on/off), and other user inputs that help Zoom to understand feature usage, improve product design, and suggest features; which third-party apps users add to a meeting or other Product and what information and actions the app is authorized to access and perform; features used (such as screen sharing, emojis, or filters); and other usage information and metrics. This also includes information about when and how people visit and interact with Zoom’s websites, including what pages they accessed, their interaction with the website features, and whether or not they signed up for a Zoom Product.
propogandist 2021-08-17 22:55:15 +0000 UTC [ - ]
dylan604 2021-08-17 23:28:33 +0000 UTC [ - ]
stjohnswarts 2021-08-18 00:24:13 +0000 UTC [ - ]
twic 2021-08-17 22:12:29 +0000 UTC [ - ]
This probably explains why, when i try to screenshare a single application window, not every application shows up! I can share my browser, file manager, and various other things, but not windows for games started by Steam.
[1] I followed these instructions https://www.mayrhofer.eu.org/post/zoom-flatpak-sandboxing/
heavyset_go 2021-08-17 23:14:28 +0000 UTC [ - ]
twic 2021-08-18 09:26:42 +0000 UTC [ - ]
ineedasername 2021-08-18 01:09:45 +0000 UTC [ - ]
It makes me wonder how Things like Steam streaming and Paperspace get around the issue.
woodruffw 2021-08-17 21:42:01 +0000 UTC [ - ]
But that doesn't work for non-X11 or if the WM is non-EWMH compliant. Presumably Wayland has a similar API, and non-EWMH is probably a minuscule group that considers this a desirable feature.
sp1rit 2021-08-17 22:47:47 +0000 UTC [ - ]
One of the downsides this has is the described issue of "screensharing beeing impossible on wayland". This is solved by the XDG Desktop Portal, which provides a unified dbus interface across the different compositor implementations for requesting a pipewire file descriptor (which can be used with gstreamer to get a live video stream of the deskop, in a way far superior to x11 framegrab). However the implementation differs for each compositor, GNOME for example asks you if you what to share the whole screen or just a specific application but wlroots (swaywm, wayfire, etc.) AFAIK automatically accepts and shares the whole screen. I don't know what KDE Plasma does.
account42 2021-08-19 09:01:22 +0000 UTC [ - ]
I don't think I'd agree that having to go through dbus and pipewire just to get the contents of the screen or a window is far superior to requesting that data from the display server. It certainly adds a lot of complexity with subpar documentation spread across multiple projects. Does this provide you a compressed stream or can you get the raw pixels that are displayed?
dathinab 2021-08-18 01:33:09 +0000 UTC [ - ]
E.g. "Wayland is, that they have no such API.", it has screen sharing APIs but they are different and require you do go through other programs like XDG Desktop Portal and Pipewire to allow the user to control such access. Similar this also means Wayland supports screen sharing just in different ways.
Anyway the important parts are:
- the implementation might differ, but the API doesn't (or at least not by a relevant degree)
- wayland requires you to go through specific APIs for screen sharing, scanning processes has little to do with screen sharing on either wayland or X.
dathinab 2021-08-18 01:12:07 +0000 UTC [ - ]
Yes there is a wayland extension for screen sharing and also support for sharing just one application.
It provides screen sharing on KDE, Gnome and most wlroots based WMs.
Through wlroots doesn't yet (or maybe does by now) support sharing a specific window I think, but this mean it doesn't support sharing a specific window and knowing which process belongs to a window doesn't really help you there either...
kelnos 2021-08-17 22:23:37 +0000 UTC [ - ]
That's definitely not a cross-platform way of doing it (and I doubt there is one, even).
On Linux you'd use libX11 and just enumerate all windows (using XQueryTree()). Walking the contents of /proc is not only unnecessary, but is more difficult to do, as looking at executable names won't tell you if a program has a GUI, or if it has any open windows. It won't give you window titles, or how many windows are open, or how to grab their contents.
Pretty sure Zoom is snooping on us and is gathering telemetry.
user5994461 2021-08-18 01:24:10 +0000 UTC [ - ]
If you say that there's an similar API on Linux for X11, then that's the same methodology across platforms.
dathinab 2021-08-18 01:34:54 +0000 UTC [ - ]
BUT there are standardized protocols/APIs for screen sharing including screen sharing of just a window. And you won't get far without using them so also no reason to scan processes.
mwcampbell 2021-08-17 22:33:19 +0000 UTC [ - ]
Don't forget Hanlon's razor, as someone else in the thread pointed out.
dathinab 2021-08-18 01:36:48 +0000 UTC [ - ]
yakubin 2021-08-17 22:36:29 +0000 UTC [ - ]
When you share a single window in Zoom, notifications are still visible to others in the meeting when they overlap with the window you're sharing. That's the case for e.g. Slack notifications.
aetherspawn 2021-08-17 22:41:48 +0000 UTC [ - ]
Caveat being if you move the window around really fast sometimes it’s possible to catch a glimpse.
yakubin 2021-08-17 23:03:11 +0000 UTC [ - ]
aetherspawn 2021-08-18 04:08:59 +0000 UTC [ - ]
To be honest, I'm actually surprised and impressed that they support screen share in the Linux version because of how many different flavors of i.e. WM there are in the wild.
eadmund 2021-08-18 13:55:39 +0000 UTC [ - ]
Now, using Wayland it may or may not be possible, depending on which WM/compositor/whatever you are running.
kiwijamo 2021-08-18 03:42:11 +0000 UTC [ - ]
123jay7 2021-08-18 00:41:58 +0000 UTC [ - ]
TameAntelope 2021-08-17 22:37:51 +0000 UTC [ - ]
dylan604 2021-08-17 23:30:48 +0000 UTC [ - ]
cygned 2021-08-18 11:28:45 +0000 UTC [ - ]
dathinab 2021-08-18 01:39:13 +0000 UTC [ - ]
Hm, I don't think that is the case for Gnome/GTK as pipe wire should grab the image before it's composed as far as I know.
But I can't check as I'm running sway which (I think, haven't checked for a while) doesn't yet support single window screen sharing.
dathinab 2021-08-18 00:57:39 +0000 UTC [ - ]
The screen sharing functionality is handled by a mix of protocols of the windows manger and service providers announced over dbus.
Even if you want to map GUI windows to processes you would do so by getting a list of windows from the window manager and getting the pid property of the windows, but if you have a list of windows you don't need to scan processes anymore...
There might (I'm not sure) be valid use-cases for this behaviour but I'm pretty confident screen sharing of specific windows isn't part of it.
sails 2021-08-17 21:32:18 +0000 UTC [ - ]
sniperjzp 2021-08-17 21:38:12 +0000 UTC [ - ]
meibo 2021-08-17 22:32:01 +0000 UTC [ - ]
Flame 2021-08-18 06:22:43 +0000 UTC [ - ]
ineedasername 2021-08-18 01:06:03 +0000 UTC [ - ]
birksherty 2021-08-18 01:10:09 +0000 UTC [ - ]
barbs 2021-08-18 12:37:39 +0000 UTC [ - ]