Knowledge (XXG)

File-hosting service

Source đź“ť

463:, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage. This form of encryption is rapidly gaining popularity, with companies such as 500:, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of 322:
which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
537: 1819: 1827: 972:. Citation from ruling: "Es ist davon auszugehen, dass die weit überwiegende Zahl von Nutzern die Speicherdienste zu legalen Zwecken einsetzen und die Zahl der missbräuchlichen Nutzer in der absoluten Minderheit ist." ("It is to be expected that the vast majority of users use the storage services for lawful purposes and the number of abusive users are in the absolute minority."). 488:
data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular
233:
which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. As of 2005 these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although
400:
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection, and the physical integrity of the provider's data center, to the financial stability of the storage provider (because, even if perfectly
198:
Many providers offer tiered storage levels, charging differently based on frequency of access and retrieval latency. There may be a different cost associated with access vs storage. For example, in a cold storage scenario, the price per GB stored over time can be very low, but it may take longer to
345:
as being evidence showing a criminal intent and venture. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and
185:
cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended
507:
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by Attorney Rick G. Sanders of Aaron | Sanders PLLC in regards to the iTunes Match "Honeypot" discussion, that a warrant to
321:
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users
248:
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting,
129:
and sharing services allow users to create special folders on each of their computers or mobile devices, which are then synchronized across all devices. Files placed in this folder can be accessed through a website or mobile app and easily shared with others for viewing or collaboration.
194:
services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
1345:"MEGA has been designed around user-controlled end-to-end encryption. MEGA's end-to-end encryption (E2EE) paradigm enhances the overall security by providing 'privacy by design', unlike many of its competitors who only provide 'privacy by policy'" 427:
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
1000:
ruling: "entspricht einem Generalverdacht gegen Sharehoster-Dienste und ihre Nutzer, der so nicht zu rechtfertigen ist" ("corresponds to a general suspicion against shared hosting services and their users, which is not to justify
189:
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
508:
search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
423:
state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage how the encryption is implemented is very important.
718: 313:
declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case
1156: 103:
Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected.
1478: 635: 1447: 484:
derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files. This enables the cloud storage provider to
439:, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of 860: 346:
defendants' communications discussing their own evasion and infringement issues. As of 2014 the case has not yet been heard. A year later, Megaupload.com relaunched as
1103: 1517: 658: 1322: 161:
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing copies of important files offsite in a secure
715: 578: 1072: 914: 118:. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use. 1152: 1020: 397:, and may be expressed with questions of the kind: Will the user be able to continue accessing their data? Who else can access it? Who can change it? 1470: 1279: 627: 1130: 1439: 1293: 885: 358: 583: 547: with: Deals with the questions: Who owns the data the user uploads? Will the act of uploading change the ownership?. You can help by 199:
access an item at a higher per GB retrieval cost. In some cases, users may have to commit to retrieval being much higher latency as well.
808: 1830: 573: 436: 326: 98: 1239: 1510: 588: 1413: 106:
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
856: 769: 957: 1045: 983: 901: 735: 691: 1216: 1503: 274: 401:
fit from a technical point of view, if the provider financially goes out of business, then its services go offline too).
1253: 1095: 665: 1859: 385:
services has prompted much discussion on security. Security, as it relates to cloud storage can be broken down into:
253:
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
1378: 1318: 517: 1854: 1068: 922: 230: 150: 598: 405: 1010: 501: 307: 69: 1849: 1822: 1126: 481: 420: 394: 182: 81: 77: 73: 1186: 1352: 882: 1526: 460: 409: 126: 793:"The Right not to Forget: Cloud Based Services Moratoriums in War Zones and Data Portability Rights" 432: 485: 475: 362: 223: 977: 804: 800: 792: 141:
have made file hosting and sharing more accessible and popular for personal and business use.
60:
files that can be accessed over the internet after providing a username and password or other
1801: 1796: 1285: 1245: 513: 166: 1590: 946:
Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.
889: 831: 722: 603: 219: 1406: 915:"RIAA joins congressional caucus in unveiling first-ever list of notorious illegal sites" 337:
concluded that Megaupload differed from other online file storage businesses, suggesting
1278:
Pont, J.; Abu Oun, O.; Brierley, C.; Arief, B.; Hernandez-Castro, J. (1 November 2019).
1665: 1615: 464: 347: 342: 330: 111: 61: 761: 536: 492:
Some point out that there is a theoretical possibility that organizations such as the
404:
The question of who can access and, potentially, change, their data, ranges from what
365:
listed Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
1843: 1776: 1555: 1550: 1024: 608: 509: 382: 318: 53: 17: 961: 1716: 1701: 1635: 1630: 1585: 1037: 593: 280: 270: 239: 235: 138: 739: 516:
who could potentially gain access to the encrypted files through various forms of
1208: 1761: 1756: 1685: 1289: 295: 254: 242: 211: 162: 115: 1786: 1771: 1751: 1746: 1680: 521: 448: 447:
policies in the event that the computer being backed-up becomes infected with
413: 338: 334: 303: 1806: 1711: 1670: 1660: 1655: 1650: 1645: 1620: 1610: 1605: 1600: 1580: 1545: 1540: 1471:"Is iTunes Match a honeypot for music pirates? A copyright lawyer weighs in" 1249: 468: 440: 370: 366: 354: 258: 72:. Other related services include content-displaying hosting services (i.e. 1440:"Bitcasa: Infinite storage comes to your desktop, but so do big questions" 1069:"Yet Another Video Streaming Service Bites The Dust, Putlocker Shuts Down" 153:. This is especially common for companies with a major internet presence. 1766: 1675: 1625: 1570: 288: 215: 178: 134: 49: 1495: 1374: 1731: 1721: 1706: 1640: 1575: 1565: 1560: 1405:
Storer, Mark W.; Greenan, Kevin; Long, Darrell D. E.; Miller, Ethan L.
299: 250: 191: 881:
Nikiforakis N., Balduzzi M. Van Acker S., Joosen W. and Balzarotti D.
1781: 1595: 444: 310: 284: 283:
without consent of the copyright owner. In such cases one individual
57: 1238:
Kolodenker, E.; Koch, W.; Stringhini, G.; Egele, M. (2 April 2017).
149:
Content providers who encounter bandwidth congestion issues may use
1153:"Cloud Data Storage, Encryption and Data Protection Best Practices" 489:
file simply by encrypting it themselves and comparing the outputs.
165:, they can quickly recover from data loss due to hardware failure, 1791: 1741: 1736: 1726: 832:"Hot Storage vs Cold Storage in 2023: Instant Access vs Archiving" 333:
and commenced criminal cases against its owners and others. Their
1375:"SpiderOak - Zero Knowledge Privacy with Encrypted Cloud Backup" 1099: 918: 857:"Cyberlockers Take Over File-Sharing Lead From BitTorrent Sites" 497: 493: 65: 1499: 306:, in 2010 the US government's congressional international anti- 1281:
A Roadmap for Improving the Impact of Anti-ransomware Research
1096:"MPAA wants more criminal cases brought against 'rogue' sites" 531: 474:
Since secret key encryption results in unique files, it makes
234:
one-click hosting can be used for many purposes, this type of
151:
specialized services for distributing cached or static content
107: 361:
for being a major piracy threat, and in 2012 Alfred Perry of
1400: 1398: 1396: 1178: 1344: 210:, sometimes referred to as cyberlocker generally describes 471:
being entirely zero knowledge file storage and sharing.
451:
capable of deleting or encrypting the victim's backups.
287:
a file to a file hosting service, which others can then
249:
maximum download speed etc. Many such sites implement a
797:
Rights to Privacy and Data Protection in Armed Conflict
548: 177:
Some online file storage services offer space on a per-
883:"Exposing the Lack of Privacy in File Hosting Services 222:(or from a remote location) onto the one-click host's 1179:"BorgBase - Secure hosting for your BorgBackup Repos" 942: 940: 659:"Cloud Storage: File Hosting and Synchronisation 2.0" 478:
impossible and therefore may use more storage space.
1319:"5 Ways To Securely Encrypt Your Files in the Cloud" 762:"Introduction to Backup and Disaster Recovery | IBM" 218:
users to easily upload one or more files from their
1694: 1533: 408:are in place in the provider's data center to what 52:hosting service specifically designed to host user 1241:PayBreak: Defense Against Cryptographic Ransomware 716:How to transfer files from Dropbox to Google Drive 459:Secret key encryption is sometimes referred to as 435:for application keys. One important permission is 279:File hosting services may be used as a means to 692:"How Dropbox Could Rule a Multi-Platform World" 1511: 8: 431:Some cloud storage providers offer granular 1042:, Crim. No. 1:12CR3 (E.D. Va. O'Grady, J.)" 579:Comparison of file synchronization software 329:seized and shut down the file hosting site 1826: 1518: 1504: 1496: 1011:Department of Justice indictment, on the 291:. Legal assessments can be very diverse. 186:after a predefined period of inactivity. 64:. Typically, file hosting services allow 1284:. ResearchGate GmbH. pp. 137–154. 1044:. United States Department of Justice. 619: 257:, FreeRapid, Mipony, Tucan Manager and 238:has, to a degree, come to compete with 27:Internet hosting service for user files 975: 902:"Piracy Beyond P2P: One-Click Hosters" 315:Atari Europe S.A.S.U. v. Rapidshare AG 1125:Jonathan Strickland (30 April 2008). 811:from the original on 22 December 2021 359:Motion Picture Association of America 7: 1299:from the original on 3 December 2019 1259:from the original on 22 October 2020 1219:from the original on 3 December 2019 1189:from the original on 3 December 2019 1075:from the original on 19 October 2016 1048:from the original on 27 October 2014 584:Comparison of online backup services 1831:Comparison of file hosting services 1419:from the original on 22 August 2013 1381:from the original on 9 October 2014 1183:BorgBase - Simple Borg Repo Hosting 574:Comparison of file hosting services 327:United States Department of Justice 229:Most such services simply return a 99:Comparison of file hosting services 1469:Brad McCarty (16 September 2011). 1438:Brad McCarty (23 September 2011). 1133:from the original on 29 April 2013 1040:United States v. Kim Dotcom, et al 830:Stockton, Ben (20 November 2020). 791:Cahane, Amir (15 September 2021). 628:"Share OneDrive files and folders" 589:Comparison of online music lockers 25: 1481:from the original on 8 March 2016 1450:from the original on 22 July 2016 1355:from the original on 14 June 2019 1106:from the original on 9 March 2018 1067:Prabhu, Vijay (17 October 2016). 1038:"Release For Victim Notification 863:from the original on 17 July 2011 1825: 1818: 1817: 1094:Sandoval, Greg (31 March 2012). 772:from the original on 5 June 2023 638:from the original on 2 June 2023 535: 395:confidentiality and availability 325:By contrast in January 2012 the 56:. These services allow users to 1325:from the original on 7 May 2013 1159:from the original on 2 May 2013 956:Roettgers, Janko (3 May 2010). 410:technical steps have been taken 181:basis, and sometimes include a 1321:. Makeuseof.com. 26 May 2012. 353:In 2016 the file hosting site 265:Use for copyright infringement 169:, or other unexpected events. 122:File sync and sharing services 1: 921:. 19 May 2010. Archived from 389:Access and integrity security 275:Legal aspects of file sharing 1209:"Why Use Immutable Storage?" 960:. Gigaom.com. Archived from 904:, Retrieved: 5 January 2008. 725:. Retrieved 24 December 2014 690:Metz, Rachel (9 July 2013). 467:(previously Megaupload) and 294:For example, in the case of 157:Backup and disaster recovery 42:online file-storage provider 1407:"Secure Data Deduplication" 1290:10.1007/978-3-030-35055-0_9 393:Deals with the question of 339:a number of design features 1876: 982:: CS1 maint: postscript ( 958:"RapidShare Wins in Court" 412:, such as access control, 268: 133:Consumer products such as 96: 1815: 1127:"How Cloud Storage Works" 888:15 September 2011 at the 281:distribute or share files 721:12 November 2016 at the 406:physical access controls 80:), virtual storage, and 1250:10.1145/3052973.3053035 599:List of backup software 502:copyright infringement 421:cloud storage services 357:has been noted by the 1527:File hosting services 1244:. ResearchGate GmbH. 1215:. 11 September 2018. 696:MIT Technology Review 514:oppressive government 482:Convergent encryption 302:file hosting service 97:Further information: 93:Personal file storage 68:, and in some cases, 38:cloud-storage service 18:Cloud storage service 1027:– see sections 7–14. 369:, Depositfiles, and 34:file-hosting service 1129:. How Stuff Works. 1013:Wall Street Journal 998:Atari v. RapidShare 964:on 26 February 2011 1860:Records management 1626:Microsoft OneDrive 1155:. Techtarget.com. 925:on 26 October 2017 900:Roettgers, Janko. 528:Ownership security 476:data deduplication 363:Paramount Pictures 1837: 1836: 1412:. Ssrc.ucsc.edu. 632:Microsoft Support 565: 564: 381:The emergence of 208:One-click hosting 203:One-click hosting 167:natural disasters 16:(Redirected from 1867: 1829: 1828: 1821: 1820: 1802:Yahoo! Briefcase 1520: 1513: 1506: 1497: 1491: 1490: 1488: 1486: 1466: 1460: 1459: 1457: 1455: 1435: 1429: 1428: 1426: 1424: 1418: 1411: 1402: 1391: 1390: 1388: 1386: 1371: 1365: 1364: 1362: 1360: 1341: 1335: 1334: 1332: 1330: 1315: 1309: 1308: 1306: 1304: 1298: 1275: 1269: 1268: 1266: 1264: 1258: 1235: 1229: 1228: 1226: 1224: 1205: 1199: 1198: 1196: 1194: 1175: 1169: 1168: 1166: 1164: 1149: 1143: 1142: 1140: 1138: 1122: 1116: 1115: 1113: 1111: 1091: 1085: 1084: 1082: 1080: 1064: 1058: 1057: 1055: 1053: 1034: 1028: 1023:15 July 2012 at 1017: 1008: 1002: 994: 988: 987: 981: 973: 971: 969: 953: 947: 944: 935: 934: 932: 930: 911: 905: 898: 892: 879: 873: 872: 870: 868: 853: 847: 846: 844: 842: 827: 821: 820: 818: 816: 788: 782: 781: 779: 777: 758: 752: 751: 749: 747: 742:on 13 March 2007 738:. Archived from 732: 726: 713: 707: 706: 704: 702: 687: 681: 680: 678: 676: 670: 664:. Archived from 663: 657:Geel, Matthias. 654: 648: 647: 645: 643: 624: 560: 557: 539: 532: 317:in Germany, the 226:free of charge. 36:, also known as 21: 1875: 1874: 1870: 1869: 1868: 1866: 1865: 1864: 1855:Social software 1840: 1839: 1838: 1833: 1811: 1690: 1591:IBM Connections 1529: 1524: 1494: 1484: 1482: 1468: 1467: 1463: 1453: 1451: 1437: 1436: 1432: 1422: 1420: 1416: 1409: 1404: 1403: 1394: 1384: 1382: 1373: 1372: 1368: 1358: 1356: 1343: 1342: 1338: 1328: 1326: 1317: 1316: 1312: 1302: 1300: 1296: 1277: 1276: 1272: 1262: 1260: 1256: 1237: 1236: 1232: 1222: 1220: 1207: 1206: 1202: 1192: 1190: 1177: 1176: 1172: 1162: 1160: 1151: 1150: 1146: 1136: 1134: 1124: 1123: 1119: 1109: 1107: 1093: 1092: 1088: 1078: 1076: 1066: 1065: 1061: 1051: 1049: 1036: 1035: 1031: 1015: 1009: 1005: 995: 991: 974: 967: 965: 955: 954: 950: 945: 938: 928: 926: 913: 912: 908: 899: 895: 890:Wayback Machine 880: 876: 866: 864: 855: 854: 850: 840: 838: 829: 828: 824: 814: 812: 790: 789: 785: 775: 773: 760: 759: 755: 745: 743: 734: 733: 729: 723:Wayback Machine 714: 710: 700: 698: 689: 688: 684: 674: 672: 671:on 31 July 2017 668: 661: 656: 655: 651: 641: 639: 626: 625: 621: 617: 604:Shared resource 570: 561: 555: 552: 545:needs expansion 530: 457: 455:Data encryption 391: 379: 343:operating model 277: 269:Main articles: 267: 205: 175: 173:Storage charges 159: 147: 145:Content caching 124: 114:documents, and 101: 95: 90: 28: 23: 22: 15: 12: 11: 5: 1873: 1871: 1863: 1862: 1857: 1852: 1842: 1841: 1835: 1834: 1816: 1813: 1812: 1810: 1809: 1804: 1799: 1794: 1789: 1784: 1779: 1774: 1769: 1764: 1759: 1754: 1749: 1744: 1739: 1734: 1729: 1724: 1719: 1714: 1709: 1704: 1698: 1696: 1692: 1691: 1689: 1688: 1683: 1678: 1673: 1668: 1666:Tencent Weiyun 1663: 1658: 1653: 1648: 1643: 1638: 1633: 1628: 1623: 1618: 1613: 1608: 1603: 1598: 1593: 1588: 1583: 1578: 1573: 1568: 1563: 1558: 1553: 1548: 1543: 1537: 1535: 1531: 1530: 1525: 1523: 1522: 1515: 1508: 1500: 1493: 1492: 1475:TheNextWeb.com 1461: 1444:TheNextWeb.com 1430: 1392: 1366: 1336: 1310: 1270: 1230: 1200: 1170: 1144: 1117: 1086: 1059: 1029: 1003: 989: 948: 936: 906: 893: 874: 848: 822: 783: 753: 736:"Macworld.com" 727: 708: 682: 649: 618: 616: 613: 612: 611: 606: 601: 596: 591: 586: 581: 576: 569: 566: 563: 562: 542: 540: 529: 526: 461:zero knowledge 456: 453: 390: 387: 378: 375: 331:Megaupload.com 266: 263: 204: 201: 174: 171: 158: 155: 146: 143: 123: 120: 112:word processor 94: 91: 89: 86: 62:authentication 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1872: 1861: 1858: 1856: 1853: 1851: 1848: 1847: 1845: 1832: 1824: 1814: 1808: 1805: 1803: 1800: 1798: 1795: 1793: 1790: 1788: 1785: 1783: 1780: 1778: 1775: 1773: 1770: 1768: 1765: 1763: 1760: 1758: 1755: 1753: 1750: 1748: 1745: 1743: 1740: 1738: 1735: 1733: 1730: 1728: 1725: 1723: 1720: 1718: 1715: 1713: 1710: 1708: 1705: 1703: 1700: 1699: 1697: 1693: 1687: 1684: 1682: 1679: 1677: 1674: 1672: 1669: 1667: 1664: 1662: 1659: 1657: 1654: 1652: 1649: 1647: 1644: 1642: 1639: 1637: 1634: 1632: 1629: 1627: 1624: 1622: 1619: 1617: 1614: 1612: 1609: 1607: 1604: 1602: 1599: 1597: 1594: 1592: 1589: 1587: 1584: 1582: 1579: 1577: 1574: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1552: 1551:Baidu Wangpan 1549: 1547: 1544: 1542: 1539: 1538: 1536: 1532: 1528: 1521: 1516: 1514: 1509: 1507: 1502: 1501: 1498: 1480: 1476: 1472: 1465: 1462: 1449: 1445: 1441: 1434: 1431: 1415: 1408: 1401: 1399: 1397: 1393: 1380: 1376: 1370: 1367: 1354: 1350: 1346: 1340: 1337: 1324: 1320: 1314: 1311: 1295: 1291: 1287: 1283: 1282: 1274: 1271: 1255: 1251: 1247: 1243: 1242: 1234: 1231: 1218: 1214: 1210: 1204: 1201: 1188: 1184: 1180: 1174: 1171: 1158: 1154: 1148: 1145: 1132: 1128: 1121: 1118: 1105: 1101: 1097: 1090: 1087: 1074: 1070: 1063: 1060: 1047: 1043: 1041: 1033: 1030: 1026: 1025:archive.today 1022: 1019: 1014: 1007: 1004: 999: 993: 990: 985: 979: 963: 959: 952: 949: 943: 941: 937: 924: 920: 916: 910: 907: 903: 897: 894: 891: 887: 884: 878: 875: 862: 858: 852: 849: 837: 833: 826: 823: 810: 806: 802: 798: 794: 787: 784: 771: 767: 763: 757: 754: 741: 737: 731: 728: 724: 720: 717: 712: 709: 697: 693: 686: 683: 667: 660: 653: 650: 637: 633: 629: 623: 620: 614: 610: 609:Cloud storage 607: 605: 602: 600: 597: 595: 592: 590: 587: 585: 582: 580: 577: 575: 572: 571: 567: 559: 550: 546: 543:This section 541: 538: 534: 533: 527: 525: 523: 519: 515: 511: 510:secret police 505: 504:by the user. 503: 499: 495: 490: 487: 483: 479: 477: 472: 470: 466: 462: 454: 452: 450: 446: 442: 438: 434: 429: 425: 422: 417: 415: 411: 407: 402: 398: 396: 388: 386: 384: 383:cloud storage 376: 374: 372: 368: 364: 360: 356: 351: 349: 344: 340: 336: 332: 328: 323: 320: 316: 312: 309: 305: 301: 297: 292: 290: 286: 282: 276: 272: 264: 262: 260: 256: 252: 246: 244: 241: 237: 232: 227: 225: 221: 217: 213: 209: 202: 200: 196: 193: 187: 184: 180: 172: 170: 168: 164: 156: 154: 152: 144: 142: 140: 136: 131: 128: 121: 119: 117: 113: 109: 104: 100: 92: 87: 85: 83: 82:remote backup 79: 75: 71: 67: 63: 59: 55: 51: 47: 43: 39: 35: 30: 19: 1850:File hosting 1717:Firefox Send 1702:Amazon Drive 1636:Resilio Sync 1631:Proton Drive 1596:iCloud Drive 1586:Google Drive 1483:. Retrieved 1474: 1464: 1452:. Retrieved 1443: 1433: 1421:. Retrieved 1385:29 September 1383:. Retrieved 1369: 1357:. Retrieved 1349:MEGA Privacy 1348: 1339: 1327:. Retrieved 1313: 1301:. Retrieved 1280: 1273: 1261:. Retrieved 1240: 1233: 1221:. Retrieved 1212: 1203: 1191:. Retrieved 1182: 1173: 1161:. Retrieved 1147: 1135:. Retrieved 1120: 1108:. Retrieved 1089: 1077:. Retrieved 1071:. TechWorm. 1062: 1050:. Retrieved 1039: 1032: 1012: 1006: 997: 992: 966:. Retrieved 962:the original 951: 927:. Retrieved 923:the original 909: 896: 877: 865:. Retrieved 851: 839:. Retrieved 835: 825: 813:. Retrieved 796: 786: 774:. Retrieved 765: 756: 744:. Retrieved 740:the original 730: 711: 699:. Retrieved 695: 685: 673:. Retrieved 666:the original 652: 640:. Retrieved 631: 622: 594:File sharing 556:January 2020 553: 549:adding to it 544: 506: 491: 486:de-duplicate 480: 473: 458: 430: 426: 418: 403: 399: 392: 380: 352: 324: 314: 293: 278: 271:File sharing 247: 236:file sharing 228: 212:web services 207: 206: 197: 188: 176: 160: 148: 139:Google Drive 132: 127:File syncing 125: 116:spreadsheets 105: 102: 45: 41: 37: 33: 31: 29: 1762:Peer Impact 1757:Norton Zone 1686:Yandex Disk 1110:10 November 1079:10 November 1052:10 November 766:www.ibm.com 437:append-only 255:JDownloader 243:filesharing 220:hard drives 214:that allow 163:data center 84:solutions. 66:HTTP access 46:cyberlocker 1844:Categories 1787:Ubuntu One 1772:RapidShare 1752:Megaupload 1747:Library.nu 1681:WeTransfer 1303:5 December 1263:5 December 1223:3 December 1193:3 December 968:16 January 929:16 January 836:Cloudwards 746:7 February 615:References 522:cybercrime 449:ransomware 414:encryption 335:indictment 319:DĂĽsseldorf 304:RapidShare 245:services. 70:FTP access 1807:ZumoDrive 1712:FileServe 1671:TitanFile 1661:Syncthing 1656:SugarSync 1651:SpiderOak 1646:ShareFile 1621:Nextcloud 1611:MediaFire 1606:Livedrive 1601:Jumpshare 1581:GameFront 1546:Backblaze 1541:Accellion 1018:s website 996:From the 841:14 August 520:or other 469:SpiderOak 441:data loss 371:MediaFire 367:FileServe 355:Putlocker 259:CryptLoad 183:bandwidth 1823:Category 1767:Pogoplug 1695:Inactive 1676:Tresorit 1571:DocuWare 1479:Archived 1448:Archived 1414:Archived 1379:Archived 1353:Archived 1323:Archived 1294:Archived 1254:Archived 1217:Archived 1187:Archived 1157:Archived 1131:Archived 1104:Archived 1073:Archived 1046:Archived 1021:Archived 978:cite web 886:Archived 861:Archived 809:Archived 770:Archived 719:Archived 701:5 August 675:5 August 642:22 April 636:Archived 568:See also 377:Security 289:download 216:internet 179:gigabyte 135:OneDrive 50:internet 48:, is an 1732:i-drive 1722:Hotfile 1707:Drop.io 1641:Seafile 1576:Dropbox 1566:CloudMe 1561:Cryptee 1001:such"). 867:12 July 815:27 June 805:3944667 776:8 March 518:hacking 416:, etc. 341:of its 285:uploads 251:CAPTCHA 192:webmail 1797:Xdrive 1782:Twango 1777:SteekR 1534:Active 1359:5 June 1213:Wasabi 803:  512:of an 445:backup 311:caucus 308:piracy 300:German 224:server 58:upload 1792:Wuala 1742:LIBOX 1737:iDisk 1727:Humyo 1485:8 May 1454:8 May 1423:8 May 1417:(PDF) 1410:(PDF) 1329:8 May 1297:(PDF) 1257:(PDF) 1163:8 May 1137:8 May 1016:' 669:(PDF) 662:(PDF) 419:Many 296:Swiss 78:image 74:video 54:files 44:, or 1616:Mega 1487:2013 1456:2013 1425:2013 1387:2014 1361:2019 1331:2013 1305:2023 1265:2023 1225:2019 1195:2019 1165:2013 1139:2013 1112:2016 1100:CNET 1081:2016 1054:2014 984:link 970:2011 931:2011 919:RIAA 869:2011 843:2023 817:2023 801:SSRN 778:2023 748:2007 703:2014 677:2014 644:2022 498:MPAA 494:RIAA 465:MEGA 443:for 433:ACLs 348:Mega 273:and 137:and 108:PDFs 88:Uses 76:and 1556:Box 1286:doi 1246:doi 551:. 240:P2P 231:URL 1846:: 1477:. 1473:. 1446:. 1442:. 1395:^ 1377:. 1351:. 1347:. 1292:. 1252:. 1211:. 1185:. 1181:. 1102:. 1098:. 980:}} 976:{{ 939:^ 917:. 859:. 834:. 807:. 799:. 795:. 768:. 764:. 694:. 634:. 630:. 524:. 496:, 373:. 350:. 261:. 110:, 40:, 32:A 1519:e 1512:t 1505:v 1489:. 1458:. 1427:. 1389:. 1363:. 1333:. 1307:. 1288:: 1267:. 1248:: 1227:. 1197:. 1167:. 1141:. 1114:. 1083:. 1056:. 986:) 933:. 871:. 845:. 819:. 780:. 750:. 705:. 679:. 646:. 558:) 554:( 298:– 20:)

Index

Cloud storage service
internet
files
upload
authentication
HTTP access
FTP access
video
image
remote backup
Comparison of file hosting services
PDFs
word processor
spreadsheets
File syncing
OneDrive
Google Drive
specialized services for distributing cached or static content
data center
natural disasters
gigabyte
bandwidth
webmail
web services
internet
hard drives
server
URL
file sharing
P2P

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑