this post was submitted on 13 Nov 2023
2 points (100.0% liked)

Data Hoarder

0 readers
3 users here now

We are digital librarians. Among us are represented the various reasons to keep data -- legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g. government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they're sure it's done right. Everyone has their reasons for curating the data they have decided to keep (either forever or For A Damn Long Time (tm) ). Along the way we have sought out like-minded individuals to exchange strategies, war stories, and cautionary tales of failures.

founded 1 year ago
MODERATORS
 

Posting here as I've seen Sync.com menitoned in the past in this sub. First, it's perplexing to see so many reviews online pointing out that Sync.com is end-to-end encrypted (e2ee) and that Sync.com does not have access to your unencrypted data, when at best what should be said is "it's closed source, and the company claims it's e2ee and zero-knowledge". But anyway...

I signed up to see if I can verify anything, and turns out you can verify that it's not e2ee and zero-knowledge. I uploaded a file, then shared it and Sync.com gave me a link that I can pass to friends. The link has no hash parts (that are seen only by the local browser), it looks like this:

https://ln5.sync.com/dl/XXXXXXXXXX/XXXXXXXX-XXXXXXXXXX-XXXXXXXXX-XXXXXXXXX

Putting that link in any browser gets you the unencrypted file directly - there is no password being asked.

The same URL is logged by the Sync.com server as well whenever someone requests it, hence not only can Sync.com also retrieve the unencrypted file themselves, but if it was stored encrypted then in order to produce that link that gets the unencrypted content, Sync.com must have access to your encryption key (synonymous with knowing your encryption password) ... so it can't be stated either that if you share files then those files lose e2ee somehow. What is clear is that Sync.com is not e2ee (unless your e2ee definition allows the host to know the encryption key).

Basically, it's at best server-side encrypted (like most of them are, or claim they are).

you are viewing a single comment's thread
view the rest of the comments
[โ€“] [email protected] 1 points 1 year ago (1 children)

Always assume that a commercial service are always sensible enough to be able to scan your files contents for anything.

Legally, if they are hosting compromising things of any sort and don't report you for it they are in big trouble. So expect that.

[โ€“] [email protected] 1 points 1 year ago

Legally, if they are hosting compromising things of any sort and don't report you for it they are in big trouble. So expect that.

That's not true. What keeps Mega from being shutdown (like MegaUpload was previously), is that Mega is carefully following Australian and American laws - which do safe harbor cloud providers that host fully encrypted files.

Now, if Mega receives a copyright infringement report that includes the decryption key... then they are obligated to investigate. This is why pirated files hosted on Mega with the keys posted pubicly, are so often taken down.

It's not that Mega is decrypting the files on the backend, it's that content providers are searching for the keys and sending them to Mega when they find them.

Apple considered decrypting iCloud Photos, despite no legal obligation to do so, because of political pressure. They backed down when consumer/EFF pressure changed the narrative.