You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The actions a user performs can be distinguished by the type (=size and destination) of sent files. Thus it can be recognized that a file or a folder is shared or revoked. If the server provider knows the recipients Drop ID (e.g., by being its contact) it can guess who shares files with whom (by also uploading meta files, drop msgs can assumed to be no fake). Might be a too scientific scenario but we could be confronted with this attack.
Action
Drop Msg
Meta Files
Files
User Relation
Create Dir
0
2 (2xDM)
0
Share Dir
1+
1 (iDM)
0
X
Unshare Dir
0+
n (all DMs below)
0
X
Create File
0
1 (DM)
1
Update File
0
1 (DM)
1
Share File
1+
3 (iDM, DM, FM)
0
X
Update Shared File
0
2 (DM, FM)
1
~
Unshare File
0+
2-3 (iDM, DM, FM)
0
X
The easiest improvement would be always sending a random number of drop messages additional to the needed ones. This would remove the ability to track the recipient. But the actions are still distinguishable by the number of meta files. I want to ask whether we want to solve it (and then how) or accept it?!
The text was updated successfully, but these errors were encountered:
The actions a user performs can be distinguished by the type (=size and destination) of sent files. Thus it can be recognized that a file or a folder is shared or revoked. If the server provider knows the recipients Drop ID (e.g., by being its contact) it can guess who shares files with whom (by also uploading meta files, drop msgs can assumed to be no fake). Might be a too scientific scenario but we could be confronted with this attack.
The easiest improvement would be always sending a random number of drop messages additional to the needed ones. This would remove the ability to track the recipient. But the actions are still distinguishable by the number of meta files. I want to ask whether we want to solve it (and then how) or accept it?!
The text was updated successfully, but these errors were encountered: