Feeds

Dropbox 'insecure and misleading' – crypto researcher

Soghoian, PGP founder say no bargepole is long enough

Reducing security risks from open source software

Updated Popular cloud storage service Dropbox is misleading users into thinking it is more secure than it really is, says a security researcher and academic, who has asked for the FTC to investigate.

Dropbox has around 25 million users. It's often used as an escape hatch by owners of Apple's iPhone and iPad: the iOS slabs don't expose the device's local file system or provide the end user with a way of manipulating files.

"Dropbox's customers face an increased risk of data breach and identity theft because their data is not encrypted according to industry best practices," says Christopher Soghoian, who filed the complaint. Soghoian is a researcher at the Center for Applied Cybersecurity Research at Indiana University. He explains that unlike other cloud services – he names SpiderOak and Wuala – Dropbox allows its employees to access unencrypted copies of users' encrypted data.

Soghoian says Dropbox made specific changes in response to a blog post highlighting the practice last month, removing the claim that no employee can access the data.

"Nobody can see your private files in Dropbox unless you deliberately invite them or put them in your Public folder" was modified to be "Other Dropbox users can't see your private files in Dropbox unless you deliberately invite them or put them in your Public folder".

A statement claiming that "Dropbox employees aren't able to access user files, and when troubleshooting an account they only have access to file metadata" was changed to "Dropbox employees are prohibited from viewing the content of files you store in your Dropbox account, and are only permitted to view file metadata (eg, file names and locations)".

Dropbox also added the disclaimer that:

"Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy."

PGP Inc co-founder Jon Callas says he deleted his DropBox account after the changes, which don't go far enough to clarify the situation, according to Soghoian in his FTC filing.

Dropbox has yet to respond to the FTC submission, which you can read in full here (16-page PDF/482KB). ®

Update

Dropbox has sent us the following the statement: "We believe this complaint is without merit, and raises issues that were addressed in our blog post on April 21, 2011. Millions of people depend on our service every day and we work hard to keep their data safe, secure, and private.”

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
L33t haxxors compete to p0wn popular home routers
EFF-endorsed SOHOpelessly Broken challenge will air routers' dirty zero day laundry
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.