{"id":9029,"date":"2024-10-27T08:44:35","date_gmt":"2024-10-27T15:44:35","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=9029"},"modified":"2024-10-27T08:44:35","modified_gmt":"2024-10-27T15:44:35","slug":"end-to-end-encrypted-cloud-storage-in-the-wild","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2024\/10\/27\/end-to-end-encrypted-cloud-storage-in-the-wild\/","title":{"rendered":"End-to-End Encrypted Cloud Storage in the Wild"},"content":{"rendered":"\n<p>Their website it more interactive and provided below with more information, and I&#8217;ve linked to their paper at bottom. But it goes to show you that you just can&#8217;t trust third parties with important data. Run your own solutions you control, where files are only on your equipment and encrypted in travel. And use a VPN to private networks for added security.<\/p>\n\n\n\n<p><a href=\"https:\/\/brokencloudstorage.info\/\">https:\/\/brokenclouds<\/a><a href=\"https:\/\/brokencloudstorage.info\/\" target=\"_blank\" rel=\"noreferrer noopener\">t<\/a><a href=\"https:\/\/brokencloudstorage.info\/\">orage.info\/<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_7e35793c-2099-467c-9fb0-534663d90a41\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<h2 class=\"wp-block-heading\">A Broken Ecosystem<\/h2>\n\n\n\n<h5 class=\"wp-block-heading\">Jonas Hofmann, Kien Tuong Truong.<\/h5>\n\n\n\n<h4 class=\"wp-block-heading\">Work to appear at ACM CCS 2024<\/h4>\n\n\n\n<p>Cloud storage is ubiquitous: Google Drive, Dropbox, and OneDrive are household names. However, these services do not provide end-to-end encryption (E2EE), meaning that the provider has access to the data stored on their servers. The promise of end-to-end encrypted cloud storage is that users can have the best of both worlds, keeping control of their data using cryptographic techniques, while still benefiting from low-cost storage solutions.<\/p>\n\n\n\n<p>However, previous analyses of <a href=\"https:\/\/mega-awry.io\/\">MEGA<\/a> and <a href=\"https:\/\/eprint.iacr.org\/2024\/546\">NextCloud<\/a> have shown that even the largest providers of E2EE cloud storage are affected by cryptographic vulnerabilities and creating secure E2EE cloud storage is a harder problem than initially thought.<\/p>\n\n\n\n<p>Indeed, we show that the current ecosystem of E2EE cloud storage is <strong>largely broken<\/strong>. We conduct a cryptographic analysis of five major providers in the field, namely Sync, pCloud, Icedrive, Seafile, and Tresorit, in the setting of a malicious server. We unveil severe cryptographic vulnerabilities in the first four.<\/p>\n\n\n\n<p>The vulnerabilities range in severity: in many cases a malicious server can inject files, tamper with file data, and even gain direct access to plaintext. Remarkably, many of our attacks affect multiple providers <em>in the same way<\/em>, revealing common failure patterns in independent cryptographic designs.<\/p>\n\n\n\n<p><a href=\"https:\/\/brokencloudstorage.info\/paper.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/brokencloudstorage.info\/paper.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Their website it more interactive and provided below with more information, and I&#8217;ve linked to their paper at bottom. But it goes to show you that you just can&#8217;t trust third parties with important data. Run your own solutions you control, where files are only on your equipment and encrypted in travel. And use a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-9029","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=9029"}],"version-history":[{"count":1,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9029\/revisions"}],"predecessor-version":[{"id":9030,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/9029\/revisions\/9030"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=9029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=9029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=9029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}