this post was submitted on 18 Oct 2023
136 points (96.6% liked)

Open Source

30349 readers
1256 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] danielquinn@lemmy.ca 19 points 11 months ago (4 children)

One red flag from that podcast:

When asked how they might deal with abuse of the service to distribute illegal files, he suggested that you could compare uploaded files to hashes of known files. This doesn't make sense in a system where the server has no knowledge of the unencrypted file, since the same file encrypted with two different passwords will result in two different hashes.

[–] braveone@lemmy.ml 9 points 11 months ago* (last edited 11 months ago) (1 children)

Can’t you hash it before uploading and upload just the hash? Or download the banned hash list locally.

[–] danielquinn@lemmy.ca 9 points 11 months ago (1 children)

Sure, but then you're trusting the client. I can always encrypt x and send along the hash for y.

[–] myself@lemmy.ml 13 points 11 months ago

In the end you can always just encrypt the illegal stuff externally before giving it to them...

load more comments (2 replies)