You've probably read about the Zoom zero day vulnerability and may be asking if Rumpus has a similar issue. The short answer is no.

Instead of running a local web server, Rumpus uses a custom URL to launch its app. (This is a more secure way to launch a meeting recommended by the author of the zero day post.) 

What does that mean to you? After clicking a Rumpus meeting link, your browser will always ask you for permission before launching the app.

If you have more questions about this topic or others, feel free to chat with us by clicking the button in the bottom right hand corner. We're happy to help!

Did this answer your question?