Today I received this response from Zoom Video Communications, Inc., regarding 
my inquiry about ascertaining the (F/LOSS) contents of the zoom binary packages 
and programs there-in, after discovering their existing solution was not 
working.

I am writing with the hope that this message reaches interested parties, who 
are more suited to addressing the situation and seeing things resolved, and 
those that wish to comment and provide insight.  I am in a position where I 
must concern about this routinely, and am only really suited to working to 
better that routine, rather than supporting the license of the relevant free 
software codes, though I would like to.

I am happy to share the entire conversation, but this last message is what 
caught my attention.  Find it in-lined here, attached to this mail, and also 
via https://desmas.net/zoom-oss.txt

> Hi Nathan,
>
> I am coming back to you regarding your request about the open source software 
> source code page, that were containing invalid links.
> All links in the page should now be working correctly 
> (https://explore.zoom.us/en/opensource/source/).
>
> Regarding your comment, please find the following explanations that I have 
> received from our Dev team:
>
> "We provide our OSS attribution in this manner intentionally, which is to 
> say, it’s legally permissible (as per OSS licensing requirements) and more 
> secure to be vague about the OSS contents of a given Zoom client/version… if 
> a critical CVE is discovered at some point after we release, it’s best not to 
> publish which specific Zoom client version contains the vulnerability, as 
> that essentially gives a roadmap to exploitation for hackers. That said, we 
> can provide more specific lists by request, but do not publish them by 
> default.
>
> Also, I’m happy to talk to any customers with specific needs… a quick review 
> of our policies/processes might alleviate the need to provide one-off lists. 
> And the reality is that most of our clients are comprised of a number of 
> shared projects, so most share a common core of OSS libraries, which is to 
> say, most of our client OSS reports will look pretty similar except for a few 
> environment-specific entries."
>
> I hope the above answers your query. Please let me know if you have any 
> questions.
>
> Best regards,
>
> Arnaud

Some specific thoughts in question form:

- Is the stated legal assertion accurate?
- Does an open-ended request suffice; may one simply request: I wish for this 
information about "all versions ever released", or perhaps specifying explicit 
version ranges matching the existing patterns?
- Must references be made (more) concretely, and if so ... how?

Thank you.
Hi Nathan,

I am coming back to you regarding your request about the open source software 
source code page, that were containing invalid links.
All links in the page should now be working correctly 
(https://explore.zoom.us/en/opensource/source/).

Regarding your comment, please find the following explanations that I have 
received from our Dev team:

"We provide our OSS attribution in this manner intentionally, which is to say, 
it’s legally permissible (as per OSS licensing requirements) and more secure 
to be vague about the OSS contents of a given Zoom client/version… if a 
critical CVE is discovered at some point after we release, it’s best not to 
publish which specific Zoom client version contains the vulnerability, as that 
essentially gives a roadmap to exploitation for hackers. That said, we can 
provide more specific lists by request, but do not publish them by default.
Also, I’m happy to talk to any customers with specific needs… a quick 
review of our policies/processes might alleviate the need to provide one-off 
lists. And the reality is that most of our clients are comprised of a number of 
shared projects, so most share a common core of OSS libraries, which is to say, 
most of our client OSS reports will look pretty similar except for a few 
environment-specific entries."

I hope the above answers your query. Please let me know if you have any 
questions.

Best regards,
Arnaud

Reply via email to