{"id":992,"date":"2021-03-01T10:35:00","date_gmt":"2021-03-01T16:35:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=992"},"modified":"2026-03-05T17:02:59","modified_gmt":"2026-03-05T23:02:59","slug":"zoom-ahead","status":"publish","type":"post","link":"https:\/\/idsinc.com\/en_gb\/zoom-ahead\/","title":{"rendered":"Zoom Ahead"},"content":{"rendered":"<p class=\"wp-block-paragraph\"><strong>Summary<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Artefacts left behind on Macs, PCs and mobile devices by the Zoom application are varied over time.<\/li><li>In the Spring of 2020 we discerned these artefacts had been reduced on the client-side.<\/li><li>Recent research suggests databases on our devices contain a lot more data points and thus useful information to investigators and litigators alike, however; it appears accessing these data has become <em>very difficult<\/em> as of now (Winter 2021) <strong>owed to new encryption.<\/strong><\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Investigators, regulators, litigators, and all those concerned know that Zoom is so heavily utilised that it has and will continue to be a focal point in data triage exercises for some time to come. In the autumn of 2020 Zoom announced it would be <a href=\"https:\/\/www.zdnet.com\/article\/zoom-rolls-out-encryption-for-all-desktop-and-mobile-users\/\">rolling out proper end-to-end encryption<\/a> for all of its traditional computer and mobile device users.&nbsp; As a quick reminder, end-to-end (E2E) encryption is the method whereby data are not only encrypted <em>in transit<\/em> at all stages, but also at rest on their end points (computers, mobile devices etc.,).&nbsp; This is the principal reason many millions of people flocked to Signal and Telegram in January.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Research<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Thanks to <a href=\"https:\/\/www.linkedin.com\/posts\/tldata4n6_zooming-into-the-pandemic-a-forensic-analysis-activity-6759866659822944256-uhpP\">work of data forensic researchers in the community<\/a>, artefacts from the Zoom platform client-side have been more rigorously isolated amongst several environments ranging from mobile phones to PC\u2019s and Macs (Credit: University of New Haven Cyber Investigation and Research Group). &nbsp;This research reflects artefacts and data stored by the Zoom application\/programme on the client-side; if there is interest on data housed by Zoom on the <em>server-side<\/em>, <a href=\"https:\/\/content.idiscoverysolutions.com\/blog\/fun-facts-and-artefacts-part-ii?locale=en\">I\u2019ve started to investigate and look into this<\/a>, however; my efforts have had little return.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The research paper looked at Windows PC versions (as well as Macs and mobiles) as recent as version 5.1.2. and we are already up to 5.5.0, with my assessment being done on 5.49.&nbsp; Needless to say, Zoom are making weekly or even twice-weekly updates to their client-side application.&nbsp; If you\u2019re on the Windows side of things, I believe this happens automatically, whereas Mac users have to manually elect to do so, unless it\u2019s a major patch and is forced.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong>Technical Bits<\/strong><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Back in the summer many of the computer-side database files seemed to store very little information, which appeared to be a departure from version 3.x variants in which electronic investigators were able to derive a good deal of information about meetings sessions.&nbsp; My initial thought was that Zoom were storing less of this on the computers as endpoints because of a <strong>relatively week encryption stance <\/strong>at the end-point level. In late Spring or early Summer of 2020, as the lockdowns were becoming normalised and more people lived in Zoom, the company purchased Keybase for encryption key management and to generally bolster the information security aspect of their operation (if I had to guess).&nbsp; The recent research and efforts by the University seem to indicate a shift back towards client-side data storage and the advent of encryption-at-rest, which I will touch upon in a moment.&nbsp; In the paper, various databases tied to individual Zoom user accounts (e.g. if both my wife and I used Zoom on this computer, both of our accounts would have their own \u2018profile ID\u2019 and databases stored therein), there appeared to be heaps of data I had not witnessed since much earlier versions of Zoom.&nbsp; I had wrongly decided that Zoom were keeping <em>all<\/em> data on the server-side indefinitely, but this move towards localised, private\/secret-key encryption is more in line with the trends in the market (Apple et al.,).&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I wanted to see some of this data for myself (why wouldn\u2019t I?!), so I parsed these data on one of my Macs running my Zoom profile to isolate databases, all the meanwhile smacking my lips in anticipation.&nbsp; Much to my dismay, these data were encrypted \u2013but as a data privacy and security advocate, I was also pleased.&nbsp; Zoom also took the liberty of naming the now-encrypted database files in an intuitive and transparent manner by affixing \u2018encks\u2019 to each.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"188\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1024x188.png\" alt=\"\" class=\"wp-image-993\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1024x188.png 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-300x55.png 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-768x141.png 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-1536x282.png 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data-16x3.png 16w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data.png 1595w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>Nice.<\/strong><\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"934\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2.png\" alt=\"\" class=\"wp-image-994\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2.png 860w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-276x300.png 276w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-768x834.png 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/Zoom-application-encrypted-data2-11x12.png 11w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\"><em>Does this look like rubbish to you?&nbsp;It should.<\/em> <em>This is your encryption at work.<\/em> <br><em>SQL Cipher 4?&nbsp; That\u2019s my wager.<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">I am now in the midst of a great and garbled data exploitation journey, the results of which I cannot predict.&nbsp; If we are at all successful in accessing these data artefacts now that they are encrypted, we are keen to share that success.&nbsp; If you don\u2019t hear back from me in the weeks and months ahead, you can rightly assume I am marinating in defeat.&nbsp; Watch this space.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><em><strong>iDiscovery Solutions is a strategic consulting, technology, and expert services firm \u2013 providing customized eDiscovery solutions from digital forensics to expert testimony for law firms and corporations across the United States and Europe.<\/strong><\/em><\/p>\n\n\n<!-- wp:themify-builder\/canvas \/-->\n\n\n<p class=\"wp-block-paragraph\"><\/p>","protected":false},"excerpt":{"rendered":"<p>Summary Artefacts left behind on Macs, PCs and mobile devices by the Zoom application are varied over time. In the Spring of 2020 we discerned these artefacts had been reduced on the client-side. Recent research suggests databases on our devices contain a lot more data points and thus useful information to investigators and litigators alike, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,30],"tags":[],"class_list":["post-992","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-evidence","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"Zoom announced end-to-end encryption for computer &amp; mobile device users. Data forensic research could show data stored by Zoom, server-side.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/zoom-ahead\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zoom Ahead\" \/>\n<meta property=\"og:description\" content=\"Zoom announced end-to-end encryption for computer &amp; mobile device users. Data forensic research could show data stored by Zoom, server-side.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/zoom-ahead\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-01T16:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T23:02:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Timothy LaTulippe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Timothy LaTulippe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"},\"author\":{\"name\":\"Timothy LaTulippe\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/52569befd821087dea6c4f73055638b7\"},\"headline\":\"Zoom Ahead\",\"datePublished\":\"2021-03-01T16:35:00+00:00\",\"dateModified\":\"2026-03-05T23:02:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"},\"wordCount\":804,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"articleSection\":[\"Blog\",\"Digital Evidence + Data Authenticity\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\",\"name\":\"Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"datePublished\":\"2021-03-01T16:35:00+00:00\",\"dateModified\":\"2026-03-05T23:02:59+00:00\",\"description\":\"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/ZoomAhead-ids-e1614270890867.jpg\",\"width\":1500,\"height\":750,\"caption\":\"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/zoom-ahead\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Digital Evidence + Data Authenticity\",\"item\":\"https:\\\/\\\/idsinc.com\\\/category\\\/blog\\\/digital-evidence\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Zoom Ahead\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/52569befd821087dea6c4f73055638b7\",\"name\":\"Timothy LaTulippe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g\",\"caption\":\"Timothy LaTulippe\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/author\\\/timothy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions","description":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/zoom-ahead\/","og_locale":"en_GB","og_type":"article","og_title":"Zoom Ahead","og_description":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.","og_url":"https:\/\/idsinc.com\/en_gb\/zoom-ahead\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2021-03-01T16:35:00+00:00","article_modified_time":"2026-03-05T23:02:59+00:00","og_image":[{"width":1500,"height":750,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","type":"image\/jpeg"}],"author":"Timothy LaTulippe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Timothy LaTulippe","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/idsinc.com\/zoom-ahead\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/"},"author":{"name":"Timothy LaTulippe","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/52569befd821087dea6c4f73055638b7"},"headline":"Zoom Ahead","datePublished":"2021-03-01T16:35:00+00:00","dateModified":"2026-03-05T23:02:59+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/"},"wordCount":804,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","articleSection":["Blog","Digital Evidence + Data Authenticity"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/zoom-ahead\/","url":"https:\/\/idsinc.com\/zoom-ahead\/","name":"Zoom Ahead (Zoom Application Data Storage) - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","datePublished":"2021-03-01T16:35:00+00:00","dateModified":"2026-03-05T23:02:59+00:00","description":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side.","breadcrumb":{"@id":"https:\/\/idsinc.com\/zoom-ahead\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/zoom-ahead\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/zoom-ahead\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/02\/ZoomAhead-ids-e1614270890867.jpg","width":1500,"height":750,"caption":"Zoom announced end-to-end encryption for computer & mobile device users. Data forensic research could show data stored by Zoom, server-side."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/zoom-ahead\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Digital Evidence + Data Authenticity","item":"https:\/\/idsinc.com\/category\/blog\/digital-evidence\/"},{"@type":"ListItem","position":4,"name":"Zoom Ahead"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/52569befd821087dea6c4f73055638b7","name":"Timothy LaTulippe","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/50d0e19660fd05d2e10293446ec5a945654a9f268e4d679f55cb53cd3a7b4e6c?s=96&d=mm&r=g","caption":"Timothy LaTulippe"},"url":"https:\/\/idsinc.com\/en_gb\/author\/timothy\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=992"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/992\/revisions"}],"predecessor-version":[{"id":9438,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/posts\/992\/revisions\/9438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/996"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/categories?post=992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/tags?post=992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}