{"id":1941,"date":"2026-04-22T11:13:47","date_gmt":"2026-04-22T08:13:47","guid":{"rendered":"https:\/\/yadin.com\/notes\/?p=1941"},"modified":"2026-04-22T11:13:47","modified_gmt":"2026-04-22T08:13:47","slug":"zoom-privacy","status":"publish","type":"post","link":"https:\/\/yadin.com\/notes\/zoom-privacy\/","title":{"rendered":"Zoom and Theoretical Privacy"},"content":{"rendered":"\n<p>Zoom is now so embedded in our daily lives that &#8220;zooming&#8221; has become a general term describing video conferencing, much like &#8220;googling&#8221; is now synonymous with running an online search. Over the past five or six years, Zoom and its competitors, Microsoft Teams and Google Meet, have replaced or supplemented many forms of in-person interaction, creating a <a href=\"https:\/\/www.fortunebusinessinsights.com\/industry-reports\/video-conferencing-market-100293\">$40 billion market<\/a>. Video conferencing supports working in remote and hybrid teams through meetings, interviews, and collaboration across locations. It enables virtual classes, tutoring, and academic events. It helps people stay connected to distant family and friends. Its ease of use, low cost, and accessibility across devices have made the technology a default for real-time communication, even when in-person options are available.<\/p>\n\n\n\n<p>Video conferencing has existed since the 1960s, but it failed to become mainstream for decades. Even when internet tools like Skype became available, adoption remained limited. By the late 2010s, enabling technologies such as broadband internet, smartphones, and cloud computing had made video conferencing more viable, but usage remained relatively low. The COVID-19 pandemic forced a sudden global shift to remote work and communication, driving mass adoption of Zoom, which was simple and reliable. Since then, Microsoft and Google have somewhat caught up by bundling and integrating their video conferencing tools, Microsoft Teams and Google Meet, into their larger ecosystems\u2014Microsoft 365 and Google Workspace. However, Zoom remains the default video conferencing tool in many social contexts. It continues to lead the market and has become essential and deeply embedded in work and social life.<\/p>\n\n\n\n<p>Zoom has faced significant scrutiny over privacy in the past. Early concerns included incidents of \u201cZoom-bombing,\u201d in which uninvited users disrupted meetings, and unclear, <a href=\"https:\/\/www.ftc.gov\/business-guidance\/blog\/2020\/11\/zooming-zooms-unfair-deceptive-security-practices-more-about-ftc-settlement\">possibly deceptive<\/a>, data protection and security practices. More recently, Zoom has been criticized for <a href=\"https:\/\/www.reco.ai\/hub\/zoom-privacy-issues\">overcollection and handling<\/a> of user data, as well as for <a href=\"https:\/\/arxiv.org\/abs\/2504.04388\">third-party app privacy<\/a> practices. However, the mainstream adoption of video conferencing suggests a privacy crisis at a more theoretical level.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-custom-b-8860-b-color has-alpha-channel-opacity has-custom-b-8860-b-background-color has-background is-style-dots\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<p>Current legal conceptions of privacy are based on a clear distinction between informational and physical privacy, a distinction that may no longer hold in the face of the complexities of a new reality in which online social interaction is inseparable from human behavior.<\/p>\n\n\n\n<p>The right to privacy has two distinct dimensions. Informational privacy is mainly associated with the collection, storage, dissemination, and disclosure of personal information. Physical privacy protects against intrusion into personal spaces, as well as against the watching, following, eavesdropping, and recording of individuals. While informational privacy focuses on the misuse of personal information, physical privacy concerns unwanted sensory access. Some privacy infringements are purely informational, for instance, the widespread online tracking of Internet users by technology corporations, with limited awareness or consent, to monetize their behavior patterns and personal preferences. Others, like peeping through a bedroom window, are purely physical. Some behaviors are compound. For example, hacking into a private webcam feed may involve both physical intrusion and information misuse at different stages of the infringement. \u00a0\u00a0<\/p>\n\n\n\n<p>Over the past three decades, legal discourse has shifted its focus to informational privacy, as the development and widespread adoption of Internet technologies have raised and amplified concerns about the misuse of personal information by corporations and governments. Newly enacted privacy statutes and regulations are entirely geared towards protecting informational privacy rights. While informational privacy affects the daily lives of billions, physical privacy is considered limited in scope, as its focus on physical spaces and sensory intrusion is less relevant for meeting the challenges of the twenty-first century.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"767\" src=\"https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/04\/compare-fibre-fRGoTJFQAHM-unsplash-1024x767.jpg\" alt=\"\" class=\"wp-image-1945\" srcset=\"https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/04\/compare-fibre-fRGoTJFQAHM-unsplash-1024x767.jpg 1024w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/04\/compare-fibre-fRGoTJFQAHM-unsplash-300x225.jpg 300w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/04\/compare-fibre-fRGoTJFQAHM-unsplash-768x575.jpg 768w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/04\/compare-fibre-fRGoTJFQAHM-unsplash.jpg 1400w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>The widespread adoption of video conferencing technologies has greatly accelerated a move towards online social interaction. This move can be understood in terms of social presence. Social Presence Theory was developed by social psychologists to describe a scale of affective communication as a function of a communication medium&#8217;s capacity to facilitate interpersonal awareness. For example, video conferencing facilitates a higher degree of social presence than a voice-only phone call. It creates a more apparent physical proximity, allows for greater intimacy, and conveys more interpersonal information, making it a richer, more socially effective medium of communication. Every means of mediated communication can be placed on a social presence continuum that extends from the most limited forms, such as asynchronous text messaging, to the richest, like real-time virtual reality environments. During the COVID-19 crisis, we saw a rapid shift towards media that provide a higher degree of social presence, addressing the need to replace physical contact with safe, remote social interaction. This drove the rapid mainstream adoption of Zoom and other video conferencing tools. <\/p>\n\n\n\n<p>The social presence ideal is physical, face-to-face interaction. As we move higher on the social presence continuum toward more socially robust means of interaction, we get closer to this ideal. Virtual reality environments achieve a high degree of social presence, effectively mirroring real-world interactions, behaviors, and attitudes\u2014creating interesting social and legal effects that <a href=\"https:\/\/yadin.com\/notes\/category\/vr\/\" data-type=\"category\" data-id=\"56\">I previously discussed in depth<\/a>. A video conference room may not mirror physical reality as effectively, but it still creates substantial social presence. There is a degree of intimacy brought about by sharing social cues such as eye contact, body language, tone of voice, and gestures. There is a sense of immediacy and physical proximity in a shared space, a result of sharing a personal setting with others while viewing them in their own personal space. The communication experience includes sensory, spatial, and social elements that bring it closer to physical interaction. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-custom-b-8860-b-color has-alpha-channel-opacity has-custom-b-8860-b-background-color has-background is-style-dots\" style=\"margin-top:var(--wp--preset--spacing--60);margin-bottom:var(--wp--preset--spacing--60)\"\/>\n\n\n\n<p>Through technology, human behavior is becoming less physical and more virtual; at the same time, online behavior has moved closer to the physical. The distinction between physical privacy and informational privacy may no longer be viable. Consider, for example, the act of spying on a video conference call. Viewing this privacy infringement solely in terms of information misuse, the collection of information without consent or authorization, mischaracterizes this harmful behavior. It ignores the substantial difference in social presence between interaction via video conference and interaction via means such as email or texting. At the same time, viewing the act of spying on a video conference call solely in terms of intrusion into a personal space, peeping, or eavesdropping, seems far-fetched; there is still a difference between mediated, online interaction and a face-to-face meeting that cannot be ignored. Perhaps it is best to view privacy infringements involving interaction on the higher end of the social presence continuum as both physical and informational. Or perhaps it is time to reconsider the theoretical disparity between physical and informational privacy.<\/p>\n\n\n\n<p>One possible approach is to treat privacy protections as graduated rather than fixed. Different means of communication carry different degrees of social presence, and privacy law could reflect this. A hacked email is not the same as covert access to a live video conference, and the difference is not merely technical. A more robust framework might recognize a category of high-presence interaction that draws on both informational and physical privacy protections. Unauthorized access to such interactions would be treated not only as a misuse of personal information but as something closer to unlawful intrusion into a socially intimate space. This would have practical implications for remedies, consent requirements, and the standard by which violations are judged. This is not necessarily a radical departure from existing privacy law. It could be understood as a return to its underlying purpose: protecting reasonable expectations of intimacy and autonomy, applied to the ways people now interact through technology. <\/p>\n\n\n<p class=\"post-views-count\" style=\"font-size:14px;text-align:left;\">\n                <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" style=\"vertical-align:middle;position:relative;top:-1px;margin-right:4px;\">\n                    <path d=\"M1 12s4-8 11-8 11 8 11 8-4 8-11 8-11-8-11-8z\"\/>\n                    <circle cx=\"12\" cy=\"12\" r=\"3\"\/>\n                <\/svg>32\n                <span style=\"margin:0 6px;\">\u00b7<\/span>\n                <span id=\"like-btn\" role=\"button\" tabindex=\"0\" style=\"background:none;border:none;padding:0;margin:0;cursor:pointer;color:inherit;font-size:14px;vertical-align:middle;\" aria-label=\"Like this post\">\n                    <svg id=\"like-heart\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"14\" height=\"14\" viewBox=\"0 0 24 24\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\" style=\"vertical-align:middle;position:relative;top:-2px;margin-right:2px;\">\n                        <path d=\"M20.84 4.61a5.5 5.5 0 0 0-7.78 0L12 5.67l-1.06-1.06a5.5 5.5 0 0 0-7.78 7.78l1.06 1.06L12 21.23l7.78-7.78 1.06-1.06a5.5 5.5 0 0 0 0-7.78z\"\/>\n                    <\/svg>\n                    <span id=\"like-count\" style=\"position:relative;top:-1px;\">1<\/span>\n                <\/span>\n                <span style=\"margin:0 6px;\">\u00b7<\/span>\n                Apr. 22, 2026\n                 <span style=\"margin:0 6px;\">\u00b7<\/span> <a href=\"https:\/\/yadin.com\/notes\/tag\/markets\/\">Markets<\/a>, <a href=\"https:\/\/yadin.com\/notes\/tag\/privacy\/\">Privacy<\/a>\n            <\/p>\n\n\n\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-group has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\">\n<p style=\"font-size:14px;text-transform:uppercase\">continue to this week&#8217;s featured note:<\/p>\n\n\n\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"wp-block-post-template is-layout-flow wp-block-post-template-is-layout-flow\"><li class=\"wp-block-post post-341 post type-post status-publish format-standard has-post-thumbnail hentry category-commentary tag-_featured tag-ai tag-culture tag-future\">\n\n<div class=\"wp-block-columns are-vertically-aligned-top is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><figure style=\"aspect-ratio:4\/3;\" class=\"wp-block-post-featured-image\"><a href=\"https:\/\/yadin.com\/notes\/quiet\/\" target=\"_self\"  ><img decoding=\"async\" width=\"300\" height=\"199\" src=\"https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-300x199.jpeg\" class=\"attachment-medium size-medium wp-post-image\" alt=\"Quiet War\" style=\"width:100%;height:100%;object-fit:cover;\" srcset=\"https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-300x199.jpeg 300w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-1024x678.jpeg 1024w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-768x509.jpeg 768w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-1536x1017.jpeg 1536w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-2048x1356.jpeg 2048w, https:\/\/yadin.com\/notes\/wp-content\/uploads\/2026\/02\/image-4-scaled.jpeg 1400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:75%\"><div style=\"font-size:14px;text-transform:uppercase;margin-top:0;margin-bottom:var(--wp--preset--spacing--10)\" class=\"taxonomy-category has-link-color wp-elements-59daf4c81d8d9356d0fba90bee17b196 wp-block-post-terms has-text-color has-cyan-bluish-gray-color\"><a href=\"https:\/\/yadin.com\/notes\/category\/commentary\/\" rel=\"tag\">Commentary<\/a><\/div>\n\n<h2 style=\"letter-spacing:1px; padding-top:0;padding-bottom:0;margin-top:0;margin-bottom:0;\" class=\"wp-block-post-title has-large-font-size\"><a href=\"https:\/\/yadin.com\/notes\/quiet\/\" target=\"_self\" >Quiet War<\/a><\/h2>\n\n<div style=\"font-style:normal;font-weight:400; padding-top:0;padding-bottom:0;margin-top:0;margin-bottom:0;\" class=\"wp-block-post-excerpt has-small-font-size\"><p class=\"wp-block-post-excerpt__excerpt\">There may not be a coordinated AI attack on humanity. But there is a gradual shift of power. <\/p><\/div><\/div>\n<\/div>\n\n<\/li><\/ul><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The mainstream adoption of video conferencing technologies suggests a theoretical privacy crisis.<\/p>\n","protected":false},"author":1,"featured_media":1945,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[53,28],"class_list":["post-1941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commentary","tag-markets","tag-privacy"],"_links":{"self":[{"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/posts\/1941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/comments?post=1941"}],"version-history":[{"count":3,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/posts\/1941\/revisions"}],"predecessor-version":[{"id":1946,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/posts\/1941\/revisions\/1946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/media\/1945"}],"wp:attachment":[{"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/media?parent=1941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/categories?post=1941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yadin.com\/notes\/wp-json\/wp\/v2\/tags?post=1941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}