- Dec 24, 2011
- 480
Please provide comments and solutions that are helpful to the author of this topic.
Security and Encryption
- Secure 256-bit TLS/SSL connection
- Client-side encryption through pCloud Crypto
- 5 copies of files on different servers
Thanks for all the replies! I will do some research on them, but for now I'll use a combo of MEGA and HDD
Well I would encrypt my stuff first and use a very complex password for the archiveIm suprised you asked for a safe site and you use MEGA.NZ?
I dont even trust MEGA one bit with my sensitive information. Its hard to even know who owns this shady website and when it will be taken down. If you got personal information, i suggest you try google drive, dropbox or onedrive. There is no the safest cloud storage site i believe.
I dont think these big companies are going to care what you store in your cloud unless its a restricted content. So why worry, its cloud after all, security is not 100% percent!
Using MEGA would easily put you on the not safe list for sure compared to ones from big IT companies.
Well I would encrypt my stuff first and use a very complex password for the archive
Keep in mind (i've said it in previous threads including this one) I don't trust cloud sites period, but if my family insists on using it then I'll do what I can to make it as private/secure as possible. I prefer hdd's and good ole dvd's as a backup.But still, you can never know how long that site will last. Kim already said he is working on a open source service. I suggest you go with Dropbox, Google Drive or Onedrive. But its upto you.
If he uses a complex password for his archive and the cloud becomes compromised and an attacker obtains his archive, it wouldn't be worth the investment of his time to wait for a brute-force attack to become successful to crack the archive password. Even if he is dedicated for waiting, depending on how complex the password is, it could take a dozen years to crack it via brute-force attacks - also depending on his system power for the calculations of speeding through the generated password guesses and applying them to the archive.But still, you can never know how long that site will last. Kim already said he is working on a open source service. I suggest you go with Dropbox, Google Drive or Onedrive. But its upto you.
I agree. Backing up to your own external HDDs/DVDs is much more secure also, since an attacker would have to steal the physical component from you directly as opposed to be able to work remotely to steal the documents.Keep in mind (i've said it in previous threads including this one) I don't trust cloud sites period, but if my family insists on using it then I'll do what I can to make it as private/secure as possible. I prefer hdd's and good ole dvd's as a backup.
If he uses a complex password for his archive and the cloud becomes compromised and an attacker obtains his archive, it wouldn't be worth the investment of his time to wait for a brute-force attack to become successful to crack the archive password. Even if he is dedicated for waiting, depending on how complex the password is, it could take a dozen years to crack it via brute-force attacks - also depending on his system power for the calculations of speeding through the generated password guesses and applying them to the archive.
For example if his password which had a length of 182 characters like: £&(##(7719*!((nsnsjsuw***!*!(!ham\REGIS000TRY\\MA1CHINE\\SOFT99921WAREsan#dwich&"(!!!chRunOnceeese!!(("*&^^%3338764bacon(!))##NtTermi33319981nateProcess[Proc811essHandleNtStatus]+888 - then this would take a very long time to crack compared to other standard passwords... Not just because it is long, but also due to the complexity addition (lots of usage of special characters, numbers, and also normal characters). Once the AES-256/RSA-2048 key has been generated from the password, good luck with brute-forcing the key!
Use as long and as complex as a password as you can manage. Just make sure you have a backup of the password in various places which only you can access so you can recover your files from the archive should you lose it and need to re-download it - since you'll then need the password, otherwise you'll be struggling like the attacker to brute-force into the archive yourself.
Anyway, chances are if an attacker found a random archive after compromising a cloud network which is heavily password-protected (they wouldn't even know how complex the password is, they'd have to take the risk of wasting their time if they can be bothered), he would most likely give up with any brute-force attacks after realising that the password is complicated due to the archive not becoming brute-forced within a day of his system running a brute-force software for archive passwords.
However it won't be the actual password which someone will try to brute-force in most cases, but the actual private key. If the password is long and complex then they won't be able to just brute-force the short password, they'll need to brute-force the key. Which is the main problem.
Think about it carefully... If brute-force was as quick and easy as it may seem, then how come top government agencies have extreme difficulty with it? There's a reason why companies use algorithms like AES-256 and RSA-2048 for the private keys...
Do the math.
Check this for more info: Time and energy required to brute-force a AES-256 encryption key. • /r/theydidthemath
Keep in mind (i've said it in previous threads including this one) I don't trust cloud sites period, but if my family insists on using it then I'll do what I can to make it as private/secure as possible. I prefer hdd's and good ole dvd's as a backup.
In that case, i suggest Google Photos. Their app is excellent in mobile devices and great in web.
No offence, but trust me. These big companies or governments are not interested in average person data.
Try google photos, you wont be disappointed.
Most family members are not IT\security geeks. They want easy-to-use and fast.
Seems like all they want to do is upload pictures and share with others.
Don't overly complicate it by making a procedure that would be appropriate for saving and uploading nuclear launch keys or designs of the next-gen stealth fighters...
I would make protection against loss the number one objective; whatever built-in cloud protection against hacking and unauthorized access is sufficient.
Your typical hacker doesn't go after family\personal photos - well - unless they are the really , really "juicy" kind that they could use to blackmail you - but what is the likelihood of that ?
BTW have you found an avatar your happy with yet?