Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> Update, 5:15PM ET July 9th: Zoom has published a blog post detailing its response to this vulnerability, including how it will patch its software and uninstall the webserver it has installed on Macs. More details here, and original story follows.

Seems like they don't, and haven't since July.



This is an example. Why would you trust an organisation that engineers "solutions" to security measures but does so without due care and attention leading to a widespread critical security bug?


the used to do it, but there was a huge backlash. I think even apple pushed a patch to block their behaviour




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: