```
<key>SMPrivilegedExecutables</key>
<dict>
<key>us.zoom.ZoomDaemon</key>
<string>identifier "us.zoom.ZoomDaemon" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string>
<key>us.zoom.ZMSipLocationHelper</key>
<string>identifier "us.zoom.ZMSipLocationHelper" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string>
</dict>
</dict>
</plist>
```
That's `~/Applications/zoom.us.app/Contents/Resources/Zoom-Info.plist`, last few lines of the file.
Even though I didn't install it with admin permissions, it's at least trying to slip that shady shit in under the radar. No idea if it succeeded or not, need to do some deep analysis to find out, but probably the simplest/surest fix is to nuke the entire filesystem and rebuild my macos installation from scratch. Done it before many a time, easy enough, just a laborious pain.
Never again, Zoom. Never again.
(Same goes for Teams, and basically anything that isn't browser-based, by the way. Assumption of human rights violations is now the default.)
I don't care if this is just a "harmless bug" or an accident. Too many attempts at shady shit have been glossed over in the name of forgiving an honest mistake. Not anymore. I'm done.
> This formatting sucks, how does HN not have markdown fenced codeblocks?
Code blocks are made by indenting by four spaces, like this:
<!-- last few lines of ~/Applications/zoom.us.app/Contents/Resources/Zoom-Info.plist -->
<key>SMPrivilegedExecutables</key>
<dict>
<key>us.zoom.ZoomDaemon</key>
<string>identifier "us.zoom.ZoomDaemon" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string>
<key>us.zoom.ZMSipLocationHelper</key>
<string>identifier "us.zoom.ZMSipLocationHelper" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string>
</dict>
</dict>
</plist>
Not sure what you're expecting here. Do you want their installer to, depending on where it's installing Zoom, be able to 1) directly modify files inside the app bundle, or 2) install an entirely different app bundle?
EDIT: This formatting sucks, how does HN not have markdown fenced codeblocks? Anyway, here's less fail formatting:
https://pastebin.com/WiRpWs61
``` <key>SMPrivilegedExecutables</key> <dict> <key>us.zoom.ZoomDaemon</key> <string>identifier "us.zoom.ZoomDaemon" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string> <key>us.zoom.ZMSipLocationHelper</key> <string>identifier "us.zoom.ZMSipLocationHelper" and anchor apple generic and certificate leaf[subject.OU] = BJ4HAAB9B3 and certificate leaf[subject.CN] = "Developer ID Application: Zoom Video Communications, Inc. (BJ4HAAB9B3)"</string> </dict> </dict> </plist> ```
That's `~/Applications/zoom.us.app/Contents/Resources/Zoom-Info.plist`, last few lines of the file.
Even though I didn't install it with admin permissions, it's at least trying to slip that shady shit in under the radar. No idea if it succeeded or not, need to do some deep analysis to find out, but probably the simplest/surest fix is to nuke the entire filesystem and rebuild my macos installation from scratch. Done it before many a time, easy enough, just a laborious pain.
Never again, Zoom. Never again.
(Same goes for Teams, and basically anything that isn't browser-based, by the way. Assumption of human rights violations is now the default.)
I don't care if this is just a "harmless bug" or an accident. Too many attempts at shady shit have been glossed over in the name of forgiving an honest mistake. Not anymore. I'm done.