• Daniel Quinn@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    11 months ago

    One red flag from that podcast:

    When asked how they might deal with abuse of the service to distribute illegal files, he suggested that you could compare uploaded files to hashes of known files. This doesn’t make sense in a system where the server has no knowledge of the unencrypted file, since the same file encrypted with two different passwords will result in two different hashes.