Hacker News new | past | comments | ask | show | jobs | submit login

Which isn't actually enough, since the surreptitiously installed server will happily go and reinstall the Zoom client for you whenever you load a zoom link, or a malicious link. You have to kill the server, and remove the ~/.zoomus directory as well. This is all pretty damning to be honest.

I would have loved to be a fly on the wall of the meetings where that policy was designed and approved.

Did no one at all speak up and say "hey, running secret webservers on obscure ports without telling the user is shady stuff"?

Registration is open for Startup School 2019. Classes start July 22nd.

Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact