Yeah but this model of trust actually still works or has worked in many places in real life. Maybe not in a big city, but it still works in many rural areas. Or letās say the chance of it actually being exploited is still relatively low in many places
So, epending on where you live, you might actually be able to hide the key under the doormat or leave the door unlocked without anything going missing. The same may apply to local service providers, such as electricians or plumbers: you can give them your house key and they usually wonāt steal from you ā again, depending on where you live.
However, this trust model definitely falls apart online. The only effective solution to protect your data in the internet is a Zero Trust model: either encrypt everything before uploading it, or host it yourself. Itās relatively simple.
Of course, you could always make excuses, such as claiming that certain services donāt sell your data, or use it for AI etc. ā which may even be true at the moment ā and convince yourself that itās therefore OK to use these services. However, time and time again, it has been proven that even reputable services change their terms of service at some point. This may be of their own initiative, or because they are sold and the new owner changes the conditions.
Therefore, again: If you want 100% data sovereignty, you can only achieve this through encryption before uploading or self-hosting.
Disagree. Check out Sync.com ā client to server storage, including when at rest, is encrypted. There is nothing special about replicating or backing up encrypted files. Its a file. It contains binary data. Period.
Yes, sync.com uses client-side encryption, and yes, you can replicate and back up encrypted files.
However, I can see two potential problems with sync.com.
As far as I know, their software is not open source, meaning you have to trust the company not to have built in any backdoors or vulnerabilities.
The share link feature could introduce vulnerabilities if implemented or used carelessly. For example, decryption keys could be embedded in links, or links could be shared without proper password protection or an expiration date.
That said, if we assume theyāre not doing anything shady, and that theyāre on top of security, with the share feature implemented properly, then nobody, not even sync.com, should be able to access your data.
Still, Iād prefer if they followed the model of services like Bitwarden or Proton, where the cleint software is open source and the code can be independently reviewed.
Third potential problem with Sync.com⦠no Linux client. For me, thatās not just a problem, itās a show-stopper. And that is precisely why Iām running Nextcloud.
This is exactly the point. E2E encryption allows file sync nothing more. As soon you want process the data on the server e.g. perform content search or edit files using web interface the server needs the key to access encrypted files.
This is the reason why Nextcloud needs access to user contents - btw it is exactly the same in commercial clouds like M365. this is even well documented by MS - even in case add snake oil like BYOK (bring your own key) the service still has and requires access to the data:
The Azure Rights Management service must be authorized to use your key.
If you only want to sync files, donāt trust your server and donāt need any server-side processing you can use e2e encryption or choose another product (IMHO Nextcloud goal is going far beyond simple sync and this is the wrong product if you donāt need more.)
The difference between the big players and Nextcloud is; Nextcloud is open source software that anyone can use to set up a cloud storage website (albeit with some tech skills).
In the scenario I gave in my post, who would be liable if someoneās bank account was emptied? The Nextcloud provider (legitimate admin [or hacker]), the user (for stupidly uploading thier sensitive information) or the Nextcloud company for providing the tool to allow the hacker to access the userās data.
Nextcloud is becoming quite popular. It wonāt be too long before hackers realize the opportunity the software gives them. 2FA might give users a sense of security but 2FA doesnāt prevent admins [good or bad] from viewing user files.
If people donāt self host or use E2EE or are not properly educated as to the risks of using un-vetted Nextcloud providers, it may gain a bad reputation in the long term. Unfortunately thereās nothing that can be done to prevent it.
the scenario more or less the same like ābad actor builds a safe and offers you to put your cash and valuables thereā - who is liable if you loose them?
as I stated before e2e encryption would help in this case but it limits data processing to users device which is contrary to collaboration goals of any cloud system. if a system with access to your data is operated (or successfully attacked) by bad actor there is no way to protect your data.