Video conferencing spying: Glare from glasses to blame?

Video conferencing spying: Glare from glasses to blame?

A study recently showed that it was possible to access information displayed on the screen of a videoconference participant through the reflection of his or her glasses. A new spying risk to be taken seriously?

Sensitive data can be exposed

Researchers from the University of Michigan in the United States and Zhejiang University in China made this revelation. In a paper entitled “Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing” they explain that they “have successfully reconstructed and recognised on-screen text as low as 10 mm in height with a 720p webcam with an accuracy of more than 75%“. In other words, it would be possible for a participant in a video conference to read text with a font size of 28 points in the reflection of the glasses of another participant in the online meeting.

However, the study points out that a number of conditions must be met for the text to be readable. The brightness of the screen, the type of glasses or the ambient light are all criteria that will reduce the risk of spying.

Moreover, it is currently impossible for researchers to analyse texts with a font size of 9 to 12 points.

A cyber security risk that could increase in the future 

With technological advances, particularly those in 4K, researchers believe that it will be increasingly easy to read texts through webcams. This type of video conference spying is therefore likely to increase.

And for good reason: video conferences are full of data, often confidential, related to the activity of companies and organisations. The use of videocollaboration tools is now massively adopted: all company functions can therefore be targeted.

The security of video conferences in question

For the time being, this type of spying, via the reflection of the participants’ glasses, does not seem to be widespread. However, vigilance must be maintained regarding the security of video conferences.

Indeed, spying on online meetings, particularly through backdoors or security flaws, is a risk that is already very real. The end-to-end encryption of communication flows makes it possible to avoid any risk of espionage and data theft. A Secure by Design videoconferencing solution is also recommended: it incorporates security mechanisms from the outset to reinforce the reliability of the software.

[How does it work?] End-to-end encryption

[How does it work?] End-to-end encryption

Encrypting all audio, video and data communications exchanged during a videoconference is possible with Tixeo’s end-to-end encryption technology. But how does it work?

Why use end-to-end encryption?

During videoconference meetings, a lot of personal and confidential information is exchanged. Without protection, this data is vulnerable to interception and eavesdropping. This risk of intrusion has particularly serious consequences for companies, which may be exposed to data theft and industrial espionage.

Reliable technology for confidential exchanges

End-to-end encryption (E2EE) is a system for transmitting data (audio, video and data). It allows only the sender and the recipient(s) to decrypt this data without any decryption phase between them. Eavesdropping and computer espionage are impossible. It is the only process that guarantees total confidentiality of communications.


Tixeo video conferencing technology integrates true end-to-end encryption in a video conference, regardless of the number of connected users. Only meeting participants, who have the encryption keys, are able to access the exchanges. Tixeo, the editor, cannot intercept the communications either.

Tixeo’s unique end-to-end encryption architecture

Link encryption is done in TLS (Transport Layer Security). End-to-end encryption (client to client) of audio, video, and data streams is done in AES 256 (Advanced Encryption Standard 256), with a Diffie-Hellman key exchange. All data transmissions via Tixeo solutions are thus guaranteed to be at an optimal security level.

The key exchange “Diffie Hellman”

This is the mechanism chosen by Tixeo, used for end-to-end encryption key exchange. When a user logs in to his Tixeo account, a short-lived encryption key is assigned to him and stored on his device. It allows to encrypt all his audio, video and data communications.

To exchange with another user, the encryption key is communicated to the other user, and vice versa. If other users tried to access their communications, they would only see a string of unreadable numbers. The next time the user logs on to the software, a new encryption key is assigned.

No trace of the communications can be found thanks to this procedure.

The true or false of end-to-end encryption

Do all video conferences encrypt their communications?

False !

Some traditional video conferences claim to have end-to-end encryption of communications. In most cases, this is simple SRTP (Secure Real-time Transport Protocol) link encryption. In fact, this technology encrypts only the flows between the user and the communication server. It is therefore very easy to access the decrypted data when it passes through their servers. With Tixeo’s secure technology, the server relays an encrypted version of the exchanges that no one is able to decrypt if they don’t have the key.

Some traditional video conferencing systems are based on SIP or H.323 protocols. Because of this architecture, these systems cannot natively integrate end-to-end encryption mechanisms.

Tixeo is Secure by design

Tixeo video conferencing technology is Secure by design. Tixeo initially designed its architecture to allow true end-to-end encryption of communications, even in multi-point video conferencing. This architecture is based on the SVC on Demand (Scalable Video Coding on Demand) technology developed by Tixeo teams. This technology takes into account network quality, CPU performance and the size of the participants’ windows in order to offer the highest stability to communications.

Is end-to-end encryption not possible in some countries?

TRUE !

Outside Europe, data protection guarantees are limited. End-to-end encryption of communications is sometimes non-existent or prohibited.

For more than 20 years, the USA PATRIOT Act has potentially authorised the tapping of any type of electronic communication. Thus, US government agencies require national IT companies operating in the United States or elsewhere to provide (if necessary) means of data collection or “backdoors”. The risk of espionage is therefore high if one considers that these backdoors are likely to be used by malicious entities. Moreover, such eavesdropping is not limited to the United States. Companies in other countries are constrained by equivalent regulations.

Tixeo Secure Videoconferencing White Paper

To learn more about video conference security

The origin of an encryption technology therefore remains a crucial element to take into account when choosing a videoconferencing solution. In Europe, thanks to GDPR, no text prohibits end-to-end encryption, and no law can force a publisher to provide encryption keys. This legal framework is of paramount importance: it guarantees optimal protection against any attempt to eavesdrop.

Deepfake, zoombombing… access to a video conference must be controlled

Deepfake, zoombombing… access to a video conference must be controlled

Communications in an unsecured video conference can be listened to and recorded at any time. Access to online meetings should be controlled, just as it is for face-to-face meetings.

 

Video conferencing, a mine of information for cybercriminals

The use of videoconferencing is no longer occasional: it is a daily occurrence for most companies. Management meetings, team meetings, crisis meetings, financial reviews and business strategy presentations are all essential moments that are now organised in hybrid or remote mode.

In teleworking, the information exchanged daily between employees can also be strategic.

During these online meetings or virtual conferences, this multitude of sensitive data circulates. This is a goldmine for cybercriminals who will do anything to access it.

 

Unwanted intrusions into videoconferencing

During the health crisis, the phenomenon of “zoombombing” appeared in video conferences. This phenomenon got its name from several unwanted intrusions into Zoom videoconferences in 2020. It can be a simple troll, but sometimes the intrusion goes further.

Even the most strategic meetings are affected by this phenomenon: Dutch journalist Danier Verlaan managed to infiltrate the confidential video conference of the European Union’s defence ministers. These intrusions are an open door to industrial espionage.

The FBI has also conducted several investigations into hackers who infiltrated online meetings, threatening participants with racist, homophobic or anti-Semitic messages.

 

A rise in deepfakes in cyber attacks

In addition to zoombombing, one method of intruding into online meetings is becoming increasingly popular. This is the deepfake, a process that makes it possible to take on the appearance of another person.

VMware, a cloud solutions provider, recently published a study on the subject. It surveyed 125 cybersecurity professionals and 2/3 of them said that the use of deepfakes in a cyber attack has increased by 13% compared to last year.

Hackers using deepfakes are increasingly targeting corporate video conferencing tools. This is the case for video conference job interviews in particular, and especially in the new technology sector. These cybercriminals use deepfake and try to get recruited in order to gather information about the company.

Important financial consequences

Espionage in video conferences, in any form, represents a real danger for the entire organisation.

If cybercriminals succeed, the consequences are often dramatic. As a result of data theft, companies are bound to experience a significant loss of turnover, as well as a considerable increase in costs, especially in terms of redesigning the security of their IS. The reputation of the organisation is also strongly impacted.

How to avoid these intrusions in a videoconference?

In order to limit the risks of intrusion, a videoconference must therefore meet certain security criteria, which are more or less important depending on the risks. For example, an online meeting of a co-management online meeting, where a lot of confidential information is shared, necessarily requires a maximum level of security.

 

Authenticating participants

In its video conferencing solution, Tixeo includes a login and password authentication (encrypted and non-reversible). This process is particularly suitable for sensitive online meetings. Indeed, only authenticated and invited users will have access. The organizer will have to validate their access and will be in full control of the participants to his videoconference.

 

Keeping control of the participants

The organiser must also keep full control over the participants in his online meeting, both before and during the videoconference. In the event of an intrusion, this enables a quick reaction and limits the impact.

In a Tixeo secure videoconference, invited participants have only minimal rights, including audio/video communication and viewing of shared documents. Only the organizer has all rights in the meeting and can :

  • partager des documents (écran, applications, fichiers…),
  • accorder des droits de partage à un autre participant,
  • ou encore lui retirer le droit de parole, voire le droit d’afficher sa caméra.

The organizer can remove people initially invited to a meeting at any time. Tixeo goes even further by offering the possibility to delegate the rights to organize and manage a meeting, right from the planning stage.

For example: Alice could organise an online meeting and give management rights to Bob. Bob can then remove Alice from the meeting. This feature is particularly interesting for people who want to delegate the setting up of a videoconference while having full control over it.

Video conferencing: is a European solution essential?

Video conferencing: is a European solution essential?

 People are increasingly vigilant about the use of their personal data. However, some european companies still rely on the global cloud and digital giants for their video conferencing tools. So why choose a European videoconference?

Permeable foreign regulations

In order to deploy video conferencing solutions on a massive scale, european companies have turned to tools with a strong reputation. In their haste, they were less attentive to the criteria of localisation and protection of their data.

Many companies have thus opted for videoconferencing solutions whose hosting and data processing are carried out outside Europe. Their data is then subject to foreign regulations, particularly American, such as the Cloud Act (Clarifying Lawful Overseas Use of Data Act).

What is the Cloud Act?

This series of extraterritorial data processing laws was introduced in the US by Donald Trump. They allow for the unrestricted use of personal data of American and foreign citizens. Indeed, these laws oblige publishers and operators located on American territory to provide data relating to electronic communications (by subpoena or warrant). This obligation applies to all data, whether stored on servers in the US or abroad.

Video conferencing vendors subject to foreign laws may therefore be required to provide their users’ encryption keys at the request of the authorities. Personal data is thus recovered for various purposes.

European video conferencing means GDPR compliance?

The Cloud Act is in total opposition to the European General Data Protection Regulation (GDPR). Much more demanding, the GDPR firmly regulates the use and processing of data, whether by the publisher itself or by third parties.

A European video conferencing solution hosts all its data on European territory. It is GDPR compliant and respectful of the company’s data.

Tixeo, the European leader in secure video conferencing, is 100% compliant with the GDPR and goes even further. Software design and development are exclusively done in France, in-house, and its proprietary technology is not subject to foreign legislation. Tixeo’s servers are hosted in France and Tixeo only chooses sovereign and European cloud hosts. The goal? To prevent any risk of dependency on extra-European powers and to guarantee maximum data protection.

To combat espionage in video conferencing

In the current tense geopolitical context, it is important for european companies to be able to benefit from sovereign video conferencing tools. The latter are not subject to external powers and the risks of data leakage are lower. Moreover, the increase in cyber attacks throughout the world can jeopardise certain organisations. This is another reason, if any were needed, to protect your video conferencing communications.

Already in 2021, Renaud Ghia (CEO of Tixeo) co-signed an article alerting to the need for greater digital sovereignty.

Spying on audio and video communications is common but can be avoided. In its European video conferencing solution, Tixeo integrates true end-to-end encryption of communications (video/audio/data). A technology that offers absolute confidentiality of communications and true independence to companies. No backdoor can be used to access communications.

Choosing a European video conferencing means opting for better data protection thanks to the GDPR. This protection will be reinforced if the video conferencing solution has a high level of security.

When the On-Premise model resists

When the On-Premise model resists

Opinion column by Renaud Ghia, Tixeo Chairman

The end of the year was rich in announcements about the cloud and the desire of politicians to increase the subsidies linked to it. On November 2, 2021, Cedric O (French Secretary of State for the Digital Economy) presented the industrial plan to support the French cloud sector, with a budget of 1.8 billion euros. On 10 November, the European Union announced that it would inject 1.98 billion euros into “digital Europe” in 2022. So much positive news for the future of the cloud in Europe: but be careful not to set it up as the only infrastructure and forget the traditional model based on the purchase of software licences (On-Premise). Indeed, in parallel with the massive use of the cloud, it is clear that the On-Premise model has a bright future ahead of it.

The cloud market continues to grow

For many years now, the cloud model has been a popular way to host solutions. According to IDC, the entire cloud ecosystem, beyond just the public cloud, will be worth over $1 trillion by 2024. It offers many advantages in terms of deployment, upgrading and maintenance cost management. It is for these reasons that most video conferencing services have migrated to the cloud on a massive scale.

At the same time, software editors offering licence purchase are becoming increasingly rare. Why would customers still use this model, which is perceived as cumbersome to deploy, outdated, costly for the company and requiring in-house skills? So many disadvantages, and not the least, at first glance…

To answer this question, it is essential to remember that, whatever some cloud leaders may say, the On-Premise model is not all bad. On the contrary, it continues to grow and today offers companies, like no other model, the possibility to keep control over security, privacy and guarantee the respect and integrity of personal data. In some cases, it may even be required by entities that categorically refuse hosting in a cloud whose parameters they do not control.

The On-Premise model is attractive

The company that integrates a solution on site has perfect control over its installation, which can be customised using the company’s directories, certificates or email servers. Of course, it is not always easy to deploy a new solution on its own servers, but some software editors facilitate this step by offering simplified installation processes or automatic updates.

Security is another reason why both private and public players are opting for this model. This is an essential condition, which is also sought after in everyday solutions, especially after the various cyber attacks on videoconferencing that have taken place during the last few years. An organisation that integrates a solution into the heart of its information system retains full control over it and can also choose whether or not to open it up to the Internet. Such a model allows the company to set precisely the level of security that it considers appropriate.

Moreover, hosting a service in-house means retaining complete autonomy over the storage of its data. A company that is not dependent on a third party retains full control over its technological strategy without any dependence on another entity, an important business argument at a time when the European public is becoming increasingly attentive to these issues. It is not always easy to know exactly what guarantees a cloud hosting company offers (backup generators, redundant network, support etc.). In some cases, it is better to be served by yourself.

Storing information without going through a third party also ensures full compliance with the GDPR and offers full transparency to its users about the use of their personal data. By doing so, a company has a clear view of the different data processing operations and does not need to negotiate or even make concessions that could jeopardise its strict compliance with the law.

It should be noted that it is not necessary to adopt a Manichean vision in its hosting strategy: some departments may decide not to rely on a single infrastructure and to opt for hybrid solutions.

Discover all Tixeo video conferencing solutions: in the Cloud or On-Premise

Hybrid cloud as an alternative

As companies around the world begin to prioritise infrastructure cost reduction, many have begun to consider the benefits of the hybrid model. This approach, which blends two or more types of environments (public and/or private cloud, and on-premises infrastructure), is the ideal solution for many businesses.

An On-Premise solution does not necessarily require a server physically installed at the heart of the company: private servers in the cloud are one such alternative. Some software editor allow data and services to be stored in a private cloud. The customer then benefits from dedicated hosting, managed by the publisher, thus eliminating all the deployment and maintenance steps that can be very time- consuming. As in a model with an installation on a local server, it is then possible to use the directories, certificates or the company’s own email servers.

It would be a considerable mistake to consider the On-Premise model, the true guarantor of our digital sovereignty, as outdated. On the contrary, the security it provides has never been more important. At a time when the United States has announced its support for the Paris Appeal on 11 November 2021 for trust and security in cyberspace, when threats are still growing, and when the European cloud (which the author of these lines supports) is developing at great speed, it is essential to reconsider on- premise hosting as essential to guarantee the security and independence of certain activities that are essential to our economy and to the functioning of the State.