I’m going to stick to my position.
I understand that the risk of using the software, as designed, for conferences, is low. However, if anyone with that many security issues wants to install software on my computer, then my concern is for my computer and what malware may have been inserted by some third party into Zoom’s unsecure software. Microsoft has decades of history with the word “Oops”, based on people taking them at their word that there are no security flaws. Then comes disappointment. Part of the Linux design philosophy is that eliminating those kind of bugs is prioritized, because anyone can look at the software and see how it works and find the security holes. Only when the software in question has been thoroughly vetted is it placed in the repositories, where less technical people like me can access it with confidence. Because Zoom refuses to prioritize this, I have to assume that malware embedded within their work is entirely possible. I just can’t afford to pay off a ransomware attack. So I’m going to play it safe and only use software I can get from a Linux repository.