|
Nas til Firma |
Besvar ![]() |
Side <1 234 |
Forfatter | |
BorgHammer ![]() Guld medlem ![]() ![]() Oprettet: 28-December-2007 Sted: Denmark Status: Offline Point: 584 |
![]() ![]() ![]() ![]() ![]() |
Dropbox skriver selv filerne ligger krypteret.
Hvis alternativet er ingen backup som i dag, mener jeg stadig Dropbox er en bedre/brugbar løsningen for det firma. |
|
Samsung UE46ES7005 + USB HDD rec.
ONKYO TX-NR709 / BOSE / TViX Slim S1 + M6600 / Chromecast QNAP TS-439PRO 5,4Tb / SONOS / iPad2 / Logitech Harmony 895+RF-iR transmitt |
|
![]() |
|
Brixen ![]() Guld medlem ![]() Oprettet: 19-Juni-2004 Sted: Denmark Status: Offline Point: 6683 |
![]() ![]() ![]() ![]() ![]() |
Så har jeg læst lidt mere om Dropbox, det jeg skrev før var efter hukommelsen. Du har ret i at Dropbox krypterer filerne på deres servere. Men så kan Dropbox ansatte også komme til at læse dem. Hvis firmaet har personfølsomme oplysninger i deres data, må det ikke bruge Dropbox: Og Wuala, som jeg nævnte, er åbenbart heller ikke så sikker som jeg troede. Det konkluderer Fraunhofer Institute her: 13. SUMMARY OF FINDINGS In the past sections, we found the following weaknesses: CloudMe is open for a wide range of attacks, including username enumeration, sending unwanted emails, Cross-Side Request Forgery attacks, account hijacking and incrimination attacks. CrashPlan uses a self-made, unpublished protocol for transport security, although SSL/TLS is an established alternative. It is not possible to remove individual installations. Dropbox does not verify the email address at registration, hence it is open for incrimination attacks. Client-side encryption is not supported. It is unclear which flavor of sharing is used if non-subscribers are included (closed user group vs. publication). Mozy encrypts files, but not filenames. The service does not manage crossuser deduplication in a secure way, thus enabling users to check if some file is already on Mozy's server. Weak passwords are accepted without notice. TeamDrive uses a self-made, unpublished protocol for transport security, although SSL/TLS is an established alternative. It is not possible to remove devices again after they have been activated. When participants are removed from spaces, the cryptographic key used to encrypt the space is not changed. We also noticed that the password reset was using http transmission without any encryption, this has been fixed by Team- Drive after we notied them. Ubuntu One does not provide any encryption. Wuala does not verify the email address at registration, hence it is open for incrimination attacks. The service uses a self-made unpublished protocol, although SSL/TLS is an established alternative. The encryption scheme does not protect against attackers that have access to the unencrypted files. URLs shared with non-subscribers contain the user name. Redigeret af Brixen - 06-Oktober-2012 kl. 09:37 |
|
Venlig hilsen
KB |
|
![]() |
Besvar ![]() |
Side <1 234 |
Skift forum | Forum-tilladelser ![]() Du kan ikke oprette nye emner i dette forum Du kan ikke besvare indlæg i dette forum Du kan ikke slette dine indlæg i dette forum Du kan ikke redigere dine indlæg i dette forum Du kan ikke oprette afstemninger i dette forum Du kan ikke stemme i dette forum |