Anonymous wrote:Anonymous wrote:Pp who posted the paragraphs from DCPS what is your source? I didn’t get an email to my Dcps account. I hope you’re right. I’m a first grade teacher and zoom is 100 times better for morning meetings and closing circle.
I believe the email was only sent to school leaders.
Anonymous wrote:our teacher just sent a note: "DCPS still mandates that we can only provide asynchronous learning opportunities (posts and videos that you can access at any time). "
no live teaching. no live morning meetings. so still can't do live anything that you record and make available. wish we were at your schools where the staff is doing what makes sense.
Anonymous wrote:Pp who posted the paragraphs from DCPS what is your source? I didn’t get an email to my Dcps account. I hope you’re right. I’m a first grade teacher and zoom is 100 times better for morning meetings and closing circle.
FWIW, the following is a summary of an investigative report released by Citizen’s Lab on Friday, Citizen's Lab being a well-respected cybersecurity institution (part of the University of Toronto). They are well known in the field as objective researchers looking into exploitable weaknesses that pose a risk to a sector, or holistically (https://citizenlab.ca/2020/04/move-fast-roll-your-own-crypto-a-quick-look-at-the-confidentiality-of-zoom-meetings/):
1. Zoom misrepresents the encryption it uses, calling it “end-to-end” encryption. In April 2020 Zoom released a blog post clarifying that their encryption is between an individual’s device and the Zoom server, NOT the entire communication. IOW, not "end-to-end" encryption as industry uses the term
2. Zoom uses custom encryption which does a poor job of masking everything (in the report, you can still make out the outlines of an encrypted picture encrypted using Zoom's algorithm), and is predictable. And Zoom's keys are weak; AES-128 vice traditional AES-256
3. In making Zoom idiot-proof (called "low friction") Zoom created a number of vulnerabilities, some of which have been discussed in the press the past few days
4. Even with all parties to a call in the US, encryption keys come from China, creating the risk that Chinese govt can force Zoom to share keys and gain access
5. Nation states are now well aware of Zoom’s vulnerabilities and likely targeting users
6. Zoom provides 0 transparency about what it shares when served with legal process
7. Zoom's Waiting Room has a vulnerability (not publicly disclosed b/c they want Zoom to fix before ppl take advantage)
Anonymous wrote:Anonymous wrote:Anonymous wrote:Teams also does not allow for break-out groups while Zoom does. My organization has been using Zoom with no issues (use password). There is a way to make Zoom secure and I hope DCPS will reconsider its guidance.
You can do break-out groups in Teams, its just not as easy, but not impossible.
Oh interesting! I did a cursory search to figure out how to do it but maybe I need to do more digging. Thanks!
Anonymous wrote:Anonymous wrote:Teams also does not allow for break-out groups while Zoom does. My organization has been using Zoom with no issues (use password). There is a way to make Zoom secure and I hope DCPS will reconsider its guidance.
You can do break-out groups in Teams, its just not as easy, but not impossible.
Anonymous wrote:Teams also does not allow for break-out groups while Zoom does. My organization has been using Zoom with no issues (use password). There is a way to make Zoom secure and I hope DCPS will reconsider its guidance.