• BalooWasWahoo@links.hackliberty.org
      link
      fedilink
      arrow-up
      5
      ·
      3 months ago

      Would they be able to do anything, legally? Like file harassment if enough people did this, or whatever computer hackery legality they could twist to fit? The stuff from here: https://statutes.capitol.texas.gov/Docs/PE/htm/PE.33.htm#33.02 is pretty vague in regards to the definitions given in https://statutes.capitol.texas.gov/Docs/PE/htm/PE.33.htm#33.01

      Could you say you had ‘permission’ from Zoom to use their ‘computer systems’ by virtue of the systems literally being set up to be accessed?

      • randomdeadguy@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        3 months ago

        I worked on lots of very large Zoom meetings. After you subscribe to the product, it’s your own responsibility to use the tools provided to moderate incoming users. Zoombombing is only possible with very poorly moderated or unmoderated Zoom meetings. They would have to do several things wrong, and here are some of them:

        1. Not requiring a password to join the meeting
        2. Including the password in the link to join the meeting.
        3. Not setting admin/moderator permissions, allowing any user to take them
        4. Not differentiating the meeting room from the default room.
        5. Distributing the wrong Zoom link, there can be one for attendees and a different one intended for spectators, who should not have audio/video broadcast permissions.

        That’s not all of them, but if this group improperly handles their Zoom setup, the company isn’t responsible because they already provided the security tools and the documentation to use them. At least, that’s my humble understanding.

        • BalooWasWahoo@links.hackliberty.org
          link
          fedilink
          arrow-up
          2
          ·
          3 months ago

          It’s not about the company being responsible. I’m more referring to the hosts of the session being able to pursue legal action, or press charges. In the eyes of the court, would you be accessing (one of the ways to run afoul of that texas law) the hosts’ “computer systems” running the zoom software, or are you accessing Zoom’s computer systems? Is Zoom able to be run on your local server, or is everything processed on their end?

          In either case, could they say that you were accessing those computer systems without the owner’s consent (one of the conditions for the crime I quoted)? The failure to set a password, giving out the password publicly, and maybe your option #5 might ways that a lawyer could construed as them giving ‘everyone’ permission to come, and thus void the crime… but we’re also talking about texas, and the law down there is as flippant as it is in the extreme court.

          I want to give people things to think about before they did this, considering that the minimum level of crime they’ll be looking at carries up to 180 days in jail. Definitely use a burner phone, VPN, and every other way to cover your tracks.