Oh nice... a guessing game. This one ? https://www.wired.com/story/zoom-bug-webcam-hackers/ Does not apply to me. I always change zoom URLs so they will only start the zoom javascript webrtc client instead of the native one. More trust into the constrained execution environment of javascript on my browsers than against networked native MacOS/Windows code. Also tape over my camera by default. That issue is not "malware provider" to me, its "malware friendly" or more topical "anti-vax". Stupid and dangerous, but not evil. Cheers Toerless On Wed, Mar 04, 2020 at 06:50:22AM +0100, Carsten Bormann wrote: > On 2020-03-04, at 03:35, Toerless Eckert <tte@xxxxxxxxx> wrote: > > > > zoom > > Known malware provider. > Can???t be used by anyone security conscious. > Too bad, because they got a lot of things right. > > Grüße, Carsten -- --- tte@xxxxxxxxx