Could you say you had 'permission' from Zoom to use their 'computer systems' by virtue of the systems literally being set up to be accessed?
I worked on lots of very large Zoom meetings. After you subscribe to the product, it's your own responsibility to use the tools provided to moderate incoming users. Zoombombing is only possible with very poorly moderated or unmoderated Zoom meetings. They would have to do several things wrong, and here are some of them:
Not requiring a password to join the meeting
Including the password in the link to join the meeting.
Not setting admin/moderator permissions, allowing any user to take them
Not differentiating the meeting room from the default room.
Distributing the wrong Zoom link, there can be one for attendees and a different one intended for spectators, who should not have audio/video broadcast permissions.
That's not all of them, but if this group improperly handles their Zoom setup, the company isn't responsible because they already provided the security tools and the documentation to use them. At least, that's my humble understanding.
How is this a shitpost? There are plenty of better communities for this stuff.
Yeah I agree this isn't even a meme at all, I get Lemmy is a very political group of people but it's honestly absurd how people post things everywhere without consideration of the theme
I got
Registering voters at the abortion clinic
Registering voters at the LGBTQ club
Registering voters at the community college
and
Registering voters with grieving families
for democrats
Why is one of the "at"s in "Registering voters at" uppercase and two lowercase?
Don’t ZoomBomb them guys, ok?
Or do. Idk. It’s a free country, right?
Would they be able to do anything, legally? Like file harassment if enough people did this, or whatever computer hackery legality they could twist to fit? The stuff from here: https://statutes.capitol.texas.gov/Docs/PE/htm/PE.33.htm#33.02 is pretty vague in regards to the definitions given in https://statutes.capitol.texas.gov/Docs/PE/htm/PE.33.htm#33.01
Could you say you had 'permission' from Zoom to use their 'computer systems' by virtue of the systems literally being set up to be accessed?
I worked on lots of very large Zoom meetings. After you subscribe to the product, it's your own responsibility to use the tools provided to moderate incoming users. Zoombombing is only possible with very poorly moderated or unmoderated Zoom meetings. They would have to do several things wrong, and here are some of them:
That's not all of them, but if this group improperly handles their Zoom setup, the company isn't responsible because they already provided the security tools and the documentation to use them. At least, that's my humble understanding.