Adds a paragraph explaining each of the criteria. Same table as the short form.
1. Since the information is based on company documentation and not testing, you may need added information for your purposes. For instance, under End-to-End Encryption for Zoom, the table says Yes - Partial. Only if you have seen the reports for Zoom will you know that E2E is only for two-party connections. All group connections are encrypted only between clients and the central server (which may or may not be in the same country as participating clients).
2. The legend code for Basic Functionality is a bit obscure in small print below the table.
(a) text chat, (b) voice conferencing, (c) video conferencing, (d) file sharing, (e) screen sharing.
3. There are typos in the table footnotes, where it says 12 instead of 2 and 14 instead of 4 (Zoom E2E).
A report available gives solid reasons to think long and hard before selecting Zoom:
Pointing out that, in addition to teh previously identified lie from Zoom that they use E2E encryption, they also claimed to use AES 256, but Citizen Lab reported that,
"However, a recent report found that Zoom only uses a single AES-128 key in Electronic Codebook (ECB) mode, which is less secure than AES-256, and ECB is not recommended for streaming media.13 Bill Marczak and John Scott-Railton from The Citizen Lab argue: Zoom's encryption and decryption use AES in ECB mode, which is well-understood to be a bad idea because this mode of encryption preserves patterns in the input. Industry-standard protocols for encryption of streaming media (e.g., the SRTP standard) recommend the use of AES in Segmented Integer Counter Mode or f8-mode, which do not have the same weakness as ECB mode.14"