Sniffing Zoom Post Quantum TLS

Hey everyone,

I’m trying to capture Zoom’s post-quantum TLS traffic with Wireshark, but so far I haven’t had success.

Setup:

  • Windows computer hosting the meeting (E2EE enabled).

  • Another Windows device acting as an access point (via hotspot).

  • Pixel 8 running the latest Android version, connected to that access point.

  • Wireshark is capturing traffic on the access point’s interface.

What I tried:

  • Started a meeting on the Windows host.

  • Joined the same meeting with the Pixel 8 through the access point.

  • Captured all traffic and checked the TLS ClientHello/ServerHello messages.

Result:

  • All Zoom TLS traffic appears to be non-PQC.

  • However, the in-meeting green shield does show “Post-Quantum End-to-End Encryption.”

Additional info:

  • Both desktop and Android Zoom apps are up to date (Desktop version - 6.6.0, Android version - 6.5.12.33008).

  • Tried both when host and client are on the same access point and when they’re not.

Am I missing something in how PQC is negotiated, or is there another way I should capture traffic from the Android device to confirm PQC TLS?

Thanks in advance.