![]() That's like saying-someone could break into my house and do that with my computer! Yes, they could. I can't believe Dropbox under that circumstance wouldn't also know where Dropbox was being accessed from when the file in question was uploaded, that sort of thing. Emails get caught in spam filters, people go on vacation, prepaid balances fall to zero - and the penalty is your entire backup archive deleted. So, two emails - two emails - and your entire backup is flushed. If your account balance falls below zero, you will lose access to Tarsnap, an email will be sent to inform you of this, and a 7 day countdown will start if your account balance is still below zero after 7 days, it will be deleted along with the data you have stored. You will be sent an email when your account balance falls below 7 days worth of storage costs warning you that you should probably add more money to your account soon. ![]() ![]() What happens when my account runs out of money? As long as you're not afraid to get your hands a bit dirty at the command line, they seem like a great service.īut, and this is a HUGE but: their account deletion policy is simply insane. While we're on the topic of zero knowledge encryption and cloud storage, Tarsnap is another provider to look at. Posted by Lesser Spotted Potoroo at 3:45 AM on Octo Sure, there is the "master password" vector but if you take it seriously, that password should also be truly random and you're going to make the effort to remember (and never share) it. The small amount of security literature I've read to date suggests that human schemes show far more predictability than we would like to believe. Hacking (cracking), after all, requires effort and if you can make the effort greater than the potential (and often unknown) reward, you stand a chance of the would-be attacker moving on (or you/community detecting something unusual and reacting).Ī software-generated, unique (at least between my various logins) random string of >10 characters for each password is better than any human password-generation scheme I've come across so far. The best anyone can do is take steps to make themselves less of a soft target. ![]() Fair point, JHarris, but I suggest literally every security measure is vulnerable to being hacked, eventually. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |