Zoom Vulnerability: Definition & Defense Techniques