Pierre the Cat

Working at home by yourself is never fun. So I launched a Twitch-stream for my colleagues where they can watch our cat sitting in his box on my desk. Doing nothing. All day long. Also feeling a bit lonely in these though times:

Zoom, the ‘Stint’ of the Digital Highway.

Zoom has become very popular in a very short period due to the quarantine measures implemented in many countries due to the COVID-19 outbreak. Interestingly, parallels can be drawn between the Stint accident that happened in the Netherlands in 2018.

Yes, the Stint caused a deadly accident and people probably didn’t die from the security vulnerabilities of Zoom. That being said, we know authoritarian regimes do not hesitate to exploit security vulnerabilities to push their dictatorial agenda’s. And with software not restricting itself to country borders, maybe we should be starting to look at these type of vulnerabilities in a different light.

When it became clear that the Stint was not secure, the government quickly intervened and banned the Stint from the road. So where is the government protecting us from digital security ‘accidents’ like the Zoom security breaches (or also recently the Citrix-shenanigans)? Why are these types of actions not governed on the Digital Highway? Where is the quick enforcement of negliance by software companies?

With GDPR a first step to a more privacy focused digital society has been taken. But it is only a mere baby-step. With our lives becoming more and more digital, accelerated by a microbe causing everyone to stay at home, can we still trust companies to provide safe services? Or do we need better checks & balances to ensure that these services are safe?

Data & information are becoming more valuable by the second, so if companies show negligence to protect our data & information, shouldn’t the government intervene to protect it’s citizens, similar to the physical world?

Today, Zoom released a statement that it will not implement new features for the next 90-days and work on their security vulnerabilities. But should we allow the usage during this period? Knowing that they actively circumvented security measures in the first place?

Visit LinkedIn for discussion: