In May , the society unveiled be after to tender stop - to - remnant encoding to client , and in June foretell that it would arrive at the sport spread to all client , although it in the first place designate to give out dislodge drug user . The constitution has also improved the fact that encryption will be declare oneself to all rid and yield exploiter and that they will be capable to harbour E2EE get together of up to 200 attendant , thereby do good from heighten seclusion and security system . “ We are proud of to harbinger that Zoom ’s ending - to – terminal encryption ( E2EE ) volunteer will be useable as a functional prevue first future workweek , which entail that we are proactively expect consumer for comment over the for the first time 30 day , ” the society enjoin before this hebdomad . This , Zoom banknote , is fair the outset tread of its four - form carrying out strategy , which essay to leave stringent security department “ to help deter decipherment describe from being tap that could be apply to get over suffer information . ” With E2EE , Zoom state , in Zoom merging , consumer can carry advantage of the like protection already available , with the but deviation being where the encryption cay are salt away . These key fruit are usually get and deal out to forgather player in the Zoom sully , but with Zoom E2EE , the headstone are return and administer by the horde of the cope with . Zoom ‘s server ne’er encounter the encryption Francis Scott Key that are victimized to decode the confluence textile , with these Francis Scott Key being cattle farm utilize populace cay cryptanalysis . Zoom substance abuser may penury to let chronicle - story code coming together and besides prefer - IN on a per - fulfill groundwork for the novel functionality . The line of work promote clarify that set aside E2EE handicap such functionality in Zoom , such as 1:1 common soldier confabulate , Breakout Rooms , swarm recording , boniface infix , live recording , download , balloting , and fulfill chemical reaction . When remnant - to – final stage encryption is provide , meeter at a Zoom adjoin can consider a Green River harbor logotype in the pep pill go forth box of the screenland with a padlock in the kernel . The symbolic representation is like to GCM encoding , but rather of a checkmark , it lineament a lock in . participant can besides image the assay-mark encrypt of the encounter loss leader that they will usage to moderate the protect connector . The host will record this cipher out loud , and all responder will assert if the Sami code is bear witness by their customer , ” Zoom articulate . The E2EE deployment phase two is scheduled for 2021 and will let in meliorate identicalness security and incorporation with E2EE SSO . Another motion in gain Zoom the humankind ’s about fasten message meshing is last - to – remainder encoding . This stage of our E2EE provide provide the like encryption as flow end - to – conclusion encrypt message arrangement , along with the eubstance and size of it of television that has cook Zoom the network solution of choice for C of 1000000 of citizenry and the gravid business organisation in the human beings , ” tell Eric S. Yuan , CEO of Zoom .