Google Meet is making meetings more secure for everyone

New changes will be rolled out to all users by early March

When you purchase through links on our site, we may earn an affiliate commission.Here’s how it works.

TheGoogle Workspaceteam have tweaked key components ofGoogle Meetto shield information regarding external participants, among other changes.

The developers reason that the changes will make it easier for admins to follow up on calls hosted within their organization, while taking steps to ensure the privacy of external participants.

“For calls hosted in externaldomains, we’ve improved how these tools obscure or entirely hide participant information, creating consistency and better protecting external participant information,” the developerswrote.

Obscuring the audit log

Obscuring the audit log

To shield details about external participants,Googlehas made several changes to the participant identifiers in the audit log of Google Meet.

For instance, email and device ID will be shown in clear text irrespective of whether the participants are internal or external. However, the information will be obscured for external participants in external meetings.

Similarly, while the organizer’s email for meetings inside the organization will be clearly visible, the email address for those who organize external meetings will be obscured.

In the same vein, while the country, region, and IP address of all internal participants within an organization’s meetings are shown as clear text, these details will not be shown at all for external participants, irrespective of whether they were part of an organization’s internal or external meeting.

Are you a pro? Subscribe to our newsletter

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

These changes will be gradually rolled out starting on February 18, 2021 and will be available to admins by default for all new meetings in early March.

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’sTechRadar Pro’sexpert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Phishing attacks surge in 2024 as cybercriminals adopt AI tools and multi-channel tactics

This new phishing strategy utilizes GitHub comments to distribute malware

Professionals are facing “tech overload” as they try to juggle multiple devices in the workplace