463:, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage. This form of encryption is rapidly gaining popularity, with companies such as
500:, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of
322:
which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
537:
1819:
1827:
972:. Citation from ruling: "Es ist davon auszugehen, dass die weit überwiegende Zahl von Nutzern die Speicherdienste zu legalen Zwecken einsetzen und die Zahl der missbräuchlichen Nutzer in der absoluten Minderheit ist." ("It is to be expected that the vast majority of users use the storage services for lawful purposes and the number of abusive users are in the absolute minority.").
488:
data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular
233:
which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. As of 2005 these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although
400:
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection, and the physical integrity of the provider's data center, to the financial stability of the storage provider (because, even if perfectly
198:
Many providers offer tiered storage levels, charging differently based on frequency of access and retrieval latency. There may be a different cost associated with access vs storage. For example, in a cold storage scenario, the price per GB stored over time can be very low, but it may take longer to
345:
as being evidence showing a criminal intent and venture. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and
185:
cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended
507:
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by
Attorney Rick G. Sanders of Aaron | Sanders PLLC in regards to the iTunes Match "Honeypot" discussion, that a warrant to
321:
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users
248:
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting,
129:
and sharing services allow users to create special folders on each of their computers or mobile devices, which are then synchronized across all devices. Files placed in this folder can be accessed through a website or mobile app and easily shared with others for viewing or collaboration.
194:
services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
1345:"MEGA has been designed around user-controlled end-to-end encryption. MEGA's end-to-end encryption (E2EE) paradigm enhances the overall security by providing 'privacy by design', unlike many of its competitors who only provide 'privacy by policy'"
427:
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
1000:
ruling: "entspricht einem
Generalverdacht gegen Sharehoster-Dienste und ihre Nutzer, der so nicht zu rechtfertigen ist" ("corresponds to a general suspicion against shared hosting services and their users, which is not to justify
189:
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
508:
search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
423:
state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage how the encryption is implemented is very important.
718:
313:
declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case
1156:
103:
Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected.
1478:
635:
1447:
484:
derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files. This enables the cloud storage provider to
439:, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of
860:
346:
defendants' communications discussing their own evasion and infringement issues. As of 2014 the case has not yet been heard. A year later, Megaupload.com relaunched as
1103:
1517:
658:
1322:
161:
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing copies of important files offsite in a secure
715:
578:
1072:
914:
118:. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use.
1152:
1020:
397:, and may be expressed with questions of the kind: Will the user be able to continue accessing their data? Who else can access it? Who can change it?
1470:
1279:
627:
1130:
1439:
1293:
885:
358:
583:
547: with: Deals with the questions: Who owns the data the user uploads? Will the act of uploading change the ownership?. You can help by
199:
access an item at a higher per GB retrieval cost. In some cases, users may have to commit to retrieval being much higher latency as well.
808:
1830:
573:
436:
326:
98:
1239:
1510:
588:
1413:
106:
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
856:
769:
957:
1045:
983:
901:
735:
691:
1216:
1503:
274:
401:
fit from a technical point of view, if the provider financially goes out of business, then its services go offline too).
1253:
1095:
665:
1859:
385:
services has prompted much discussion on security. Security, as it relates to cloud storage can be broken down into:
253:
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
1378:
1318:
517:
1854:
1068:
922:
230:
150:
598:
405:
1010:
501:
307:
69:
1849:
1822:
1126:
481:
420:
394:
182:
81:
77:
73:
1186:
1352:
882:
1526:
460:
409:
126:
793:"The Right not to Forget: Cloud Based Services Moratoriums in War Zones and Data Portability Rights"
432:
485:
475:
362:
223:
977:
804:
800:
792:
141:
have made file hosting and sharing more accessible and popular for personal and business use.
60:
files that can be accessed over the internet after providing a username and password or other
1801:
1796:
1285:
1245:
513:
166:
1590:
946:
Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.
889:
831:
722:
603:
219:
1406:
915:"RIAA joins congressional caucus in unveiling first-ever list of notorious illegal sites"
337:
concluded that
Megaupload differed from other online file storage businesses, suggesting
1278:
Pont, J.; Abu Oun, O.; Brierley, C.; Arief, B.; Hernandez-Castro, J. (1 November 2019).
1665:
1615:
464:
347:
342:
330:
111:
61:
761:
536:
492:
Some point out that there is a theoretical possibility that organizations such as the
404:
The question of who can access and, potentially, change, their data, ranges from what
365:
listed
Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
1843:
1776:
1555:
1550:
1024:
608:
509:
382:
318:
53:
17:
961:
1716:
1701:
1635:
1630:
1585:
1037:
593:
280:
270:
239:
235:
138:
739:
516:
who could potentially gain access to the encrypted files through various forms of
1208:
1761:
1756:
1685:
1289:
295:
254:
242:
211:
162:
115:
1786:
1771:
1751:
1746:
1680:
521:
448:
447:
policies in the event that the computer being backed-up becomes infected with
413:
338:
334:
303:
1806:
1711:
1670:
1660:
1655:
1650:
1645:
1620:
1610:
1605:
1600:
1580:
1545:
1540:
1471:"Is iTunes Match a honeypot for music pirates? A copyright lawyer weighs in"
1249:
468:
440:
370:
366:
354:
258:
72:. Other related services include content-displaying hosting services (i.e.
1440:"Bitcasa: Infinite storage comes to your desktop, but so do big questions"
1069:"Yet Another Video Streaming Service Bites The Dust, Putlocker Shuts Down"
153:. This is especially common for companies with a major internet presence.
1766:
1675:
1625:
1570:
288:
215:
178:
134:
49:
1495:
1374:
1731:
1721:
1706:
1640:
1575:
1565:
1560:
1405:
Storer, Mark W.; Greenan, Kevin; Long, Darrell D. E.; Miller, Ethan L.
299:
250:
191:
881:
Nikiforakis N., Balduzzi M. Van Acker S., Joosen W. and
Balzarotti D.
1781:
1595:
444:
310:
284:
283:
without consent of the copyright owner. In such cases one individual
57:
1238:
Kolodenker, E.; Koch, W.; Stringhini, G.; Egele, M. (2 April 2017).
149:
Content providers who encounter bandwidth congestion issues may use
1153:"Cloud Data Storage, Encryption and Data Protection Best Practices"
489:
file simply by encrypting it themselves and comparing the outputs.
165:, they can quickly recover from data loss due to hardware failure,
1791:
1741:
1736:
1726:
832:"Hot Storage vs Cold Storage in 2023: Instant Access vs Archiving"
333:
and commenced criminal cases against its owners and others. Their
1375:"SpiderOak - Zero Knowledge Privacy with Encrypted Cloud Backup"
1099:
918:
857:"Cyberlockers Take Over File-Sharing Lead From BitTorrent Sites"
497:
493:
65:
1499:
306:, in 2010 the US government's congressional international anti-
1281:
A Roadmap for
Improving the Impact of Anti-ransomware Research
1096:"MPAA wants more criminal cases brought against 'rogue' sites"
531:
474:
Since secret key encryption results in unique files, it makes
234:
one-click hosting can be used for many purposes, this type of
151:
specialized services for distributing cached or static content
107:
361:
for being a major piracy threat, and in 2012 Alfred Perry of
1400:
1398:
1396:
1178:
1344:
210:, sometimes referred to as cyberlocker generally describes
471:
being entirely zero knowledge file storage and sharing.
451:
capable of deleting or encrypting the victim's backups.
287:
a file to a file hosting service, which others can then
249:
maximum download speed etc. Many such sites implement a
797:
Rights to
Privacy and Data Protection in Armed Conflict
548:
177:
Some online file storage services offer space on a per-
883:"Exposing the Lack of Privacy in File Hosting Services
222:(or from a remote location) onto the one-click host's
1179:"BorgBase - Secure hosting for your BorgBackup Repos"
942:
940:
659:"Cloud Storage: File Hosting and Synchronisation 2.0"
478:
impossible and therefore may use more storage space.
1319:"5 Ways To Securely Encrypt Your Files in the Cloud"
762:"Introduction to Backup and Disaster Recovery | IBM"
218:
users to easily upload one or more files from their
1694:
1533:
408:are in place in the provider's data center to what
52:hosting service specifically designed to host user
1241:PayBreak: Defense Against Cryptographic Ransomware
716:How to transfer files from Dropbox to Google Drive
459:Secret key encryption is sometimes referred to as
435:for application keys. One important permission is
279:File hosting services may be used as a means to
692:"How Dropbox Could Rule a Multi-Platform World"
1511:
8:
431:Some cloud storage providers offer granular
1042:, Crim. No. 1:12CR3 (E.D. Va. O'Grady, J.)"
579:Comparison of file synchronization software
329:seized and shut down the file hosting site
1826:
1518:
1504:
1496:
1011:Department of Justice indictment, on the
291:. Legal assessments can be very diverse.
186:after a predefined period of inactivity.
64:. Typically, file hosting services allow
1284:. ResearchGate GmbH. pp. 137–154.
1044:. United States Department of Justice.
619:
257:, FreeRapid, Mipony, Tucan Manager and
238:has, to a degree, come to compete with
27:Internet hosting service for user files
975:
902:"Piracy Beyond P2P: One-Click Hosters"
315:Atari Europe S.A.S.U. v. Rapidshare AG
1125:Jonathan Strickland (30 April 2008).
811:from the original on 22 December 2021
359:Motion Picture Association of America
7:
1299:from the original on 3 December 2019
1259:from the original on 22 October 2020
1219:from the original on 3 December 2019
1189:from the original on 3 December 2019
1075:from the original on 19 October 2016
1048:from the original on 27 October 2014
584:Comparison of online backup services
1831:Comparison of file hosting services
1419:from the original on 22 August 2013
1381:from the original on 9 October 2014
1183:BorgBase - Simple Borg Repo Hosting
574:Comparison of file hosting services
327:United States Department of Justice
229:Most such services simply return a
99:Comparison of file hosting services
1469:Brad McCarty (16 September 2011).
1438:Brad McCarty (23 September 2011).
1133:from the original on 29 April 2013
1040:United States v. Kim Dotcom, et al
830:Stockton, Ben (20 November 2020).
791:Cahane, Amir (15 September 2021).
628:"Share OneDrive files and folders"
589:Comparison of online music lockers
25:
1481:from the original on 8 March 2016
1450:from the original on 22 July 2016
1355:from the original on 14 June 2019
1106:from the original on 9 March 2018
1067:Prabhu, Vijay (17 October 2016).
1038:"Release For Victim Notification
863:from the original on 17 July 2011
1825:
1818:
1817:
1094:Sandoval, Greg (31 March 2012).
772:from the original on 5 June 2023
638:from the original on 2 June 2023
535:
395:confidentiality and availability
325:By contrast in January 2012 the
56:. These services allow users to
1325:from the original on 7 May 2013
1159:from the original on 2 May 2013
956:Roettgers, Janko (3 May 2010).
410:technical steps have been taken
181:basis, and sometimes include a
1321:. Makeuseof.com. 26 May 2012.
353:In 2016 the file hosting site
265:Use for copyright infringement
169:, or other unexpected events.
122:File sync and sharing services
1:
921:. 19 May 2010. Archived from
389:Access and integrity security
275:Legal aspects of file sharing
1209:"Why Use Immutable Storage?"
960:. Gigaom.com. Archived from
904:, Retrieved: 5 January 2008.
725:. Retrieved 24 December 2014
690:Metz, Rachel (9 July 2013).
467:(previously Megaupload) and
294:For example, in the case of
157:Backup and disaster recovery
42:online file-storage provider
1407:"Secure Data Deduplication"
1290:10.1007/978-3-030-35055-0_9
393:Deals with the question of
339:a number of design features
1876:
982:: CS1 maint: postscript (
958:"RapidShare Wins in Court"
412:, such as access control,
268:
133:Consumer products such as
96:
1815:
1127:"How Cloud Storage Works"
888:15 September 2011 at the
281:distribute or share files
721:12 November 2016 at the
406:physical access controls
80:), virtual storage, and
1250:10.1145/3052973.3053035
599:List of backup software
502:copyright infringement
421:cloud storage services
357:has been noted by the
1527:File hosting services
1244:. ResearchGate GmbH.
1215:. 11 September 2018.
696:MIT Technology Review
514:oppressive government
482:Convergent encryption
302:file hosting service
97:Further information:
93:Personal file storage
68:, and in some cases,
38:cloud-storage service
18:Cloud storage service
1027:– see sections 7–14.
369:, Depositfiles, and
34:file-hosting service
1129:. How Stuff Works.
1013:Wall Street Journal
998:Atari v. RapidShare
964:on 26 February 2011
1860:Records management
1626:Microsoft OneDrive
1155:. Techtarget.com.
925:on 26 October 2017
900:Roettgers, Janko.
528:Ownership security
476:data deduplication
363:Paramount Pictures
1837:
1836:
1412:. Ssrc.ucsc.edu.
632:Microsoft Support
565:
564:
381:The emergence of
208:One-click hosting
203:One-click hosting
167:natural disasters
16:(Redirected from
1867:
1829:
1828:
1821:
1820:
1802:Yahoo! Briefcase
1520:
1513:
1506:
1497:
1491:
1490:
1488:
1486:
1466:
1460:
1459:
1457:
1455:
1435:
1429:
1428:
1426:
1424:
1418:
1411:
1402:
1391:
1390:
1388:
1386:
1371:
1365:
1364:
1362:
1360:
1341:
1335:
1334:
1332:
1330:
1315:
1309:
1308:
1306:
1304:
1298:
1275:
1269:
1268:
1266:
1264:
1258:
1235:
1229:
1228:
1226:
1224:
1205:
1199:
1198:
1196:
1194:
1175:
1169:
1168:
1166:
1164:
1149:
1143:
1142:
1140:
1138:
1122:
1116:
1115:
1113:
1111:
1091:
1085:
1084:
1082:
1080:
1064:
1058:
1057:
1055:
1053:
1034:
1028:
1023:15 July 2012 at
1017:
1008:
1002:
994:
988:
987:
981:
973:
971:
969:
953:
947:
944:
935:
934:
932:
930:
911:
905:
898:
892:
879:
873:
872:
870:
868:
853:
847:
846:
844:
842:
827:
821:
820:
818:
816:
788:
782:
781:
779:
777:
758:
752:
751:
749:
747:
742:on 13 March 2007
738:. Archived from
732:
726:
713:
707:
706:
704:
702:
687:
681:
680:
678:
676:
670:
664:. Archived from
663:
657:Geel, Matthias.
654:
648:
647:
645:
643:
624:
560:
557:
539:
532:
317:in Germany, the
226:free of charge.
36:, also known as
21:
1875:
1874:
1870:
1869:
1868:
1866:
1865:
1864:
1855:Social software
1840:
1839:
1838:
1833:
1811:
1690:
1591:IBM Connections
1529:
1524:
1494:
1484:
1482:
1468:
1467:
1463:
1453:
1451:
1437:
1436:
1432:
1422:
1420:
1416:
1409:
1404:
1403:
1394:
1384:
1382:
1373:
1372:
1368:
1358:
1356:
1343:
1342:
1338:
1328:
1326:
1317:
1316:
1312:
1302:
1300:
1296:
1277:
1276:
1272:
1262:
1260:
1256:
1237:
1236:
1232:
1222:
1220:
1207:
1206:
1202:
1192:
1190:
1177:
1176:
1172:
1162:
1160:
1151:
1150:
1146:
1136:
1134:
1124:
1123:
1119:
1109:
1107:
1093:
1092:
1088:
1078:
1076:
1066:
1065:
1061:
1051:
1049:
1036:
1035:
1031:
1015:
1009:
1005:
995:
991:
974:
967:
965:
955:
954:
950:
945:
938:
928:
926:
913:
912:
908:
899:
895:
890:Wayback Machine
880:
876:
866:
864:
855:
854:
850:
840:
838:
829:
828:
824:
814:
812:
790:
789:
785:
775:
773:
760:
759:
755:
745:
743:
734:
733:
729:
723:Wayback Machine
714:
710:
700:
698:
689:
688:
684:
674:
672:
671:on 31 July 2017
668:
661:
656:
655:
651:
641:
639:
626:
625:
621:
617:
604:Shared resource
570:
561:
555:
552:
545:needs expansion
530:
457:
455:Data encryption
391:
379:
343:operating model
277:
269:Main articles:
267:
205:
175:
173:Storage charges
159:
147:
145:Content caching
124:
114:documents, and
101:
95:
90:
28:
23:
22:
15:
12:
11:
5:
1873:
1871:
1863:
1862:
1857:
1852:
1842:
1841:
1835:
1834:
1816:
1813:
1812:
1810:
1809:
1804:
1799:
1794:
1789:
1784:
1779:
1774:
1769:
1764:
1759:
1754:
1749:
1744:
1739:
1734:
1729:
1724:
1719:
1714:
1709:
1704:
1698:
1696:
1692:
1691:
1689:
1688:
1683:
1678:
1673:
1668:
1666:Tencent Weiyun
1663:
1658:
1653:
1648:
1643:
1638:
1633:
1628:
1623:
1618:
1613:
1608:
1603:
1598:
1593:
1588:
1583:
1578:
1573:
1568:
1563:
1558:
1553:
1548:
1543:
1537:
1535:
1531:
1530:
1525:
1523:
1522:
1515:
1508:
1500:
1493:
1492:
1475:TheNextWeb.com
1461:
1444:TheNextWeb.com
1430:
1392:
1366:
1336:
1310:
1270:
1230:
1200:
1170:
1144:
1117:
1086:
1059:
1029:
1003:
989:
948:
936:
906:
893:
874:
848:
822:
783:
753:
736:"Macworld.com"
727:
708:
682:
649:
618:
616:
613:
612:
611:
606:
601:
596:
591:
586:
581:
576:
569:
566:
563:
562:
542:
540:
529:
526:
461:zero knowledge
456:
453:
390:
387:
378:
375:
331:Megaupload.com
266:
263:
204:
201:
174:
171:
158:
155:
146:
143:
123:
120:
112:word processor
94:
91:
89:
86:
62:authentication
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1872:
1861:
1858:
1856:
1853:
1851:
1848:
1847:
1845:
1832:
1824:
1814:
1808:
1805:
1803:
1800:
1798:
1795:
1793:
1790:
1788:
1785:
1783:
1780:
1778:
1775:
1773:
1770:
1768:
1765:
1763:
1760:
1758:
1755:
1753:
1750:
1748:
1745:
1743:
1740:
1738:
1735:
1733:
1730:
1728:
1725:
1723:
1720:
1718:
1715:
1713:
1710:
1708:
1705:
1703:
1700:
1699:
1697:
1693:
1687:
1684:
1682:
1679:
1677:
1674:
1672:
1669:
1667:
1664:
1662:
1659:
1657:
1654:
1652:
1649:
1647:
1644:
1642:
1639:
1637:
1634:
1632:
1629:
1627:
1624:
1622:
1619:
1617:
1614:
1612:
1609:
1607:
1604:
1602:
1599:
1597:
1594:
1592:
1589:
1587:
1584:
1582:
1579:
1577:
1574:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1554:
1552:
1551:Baidu Wangpan
1549:
1547:
1544:
1542:
1539:
1538:
1536:
1532:
1528:
1521:
1516:
1514:
1509:
1507:
1502:
1501:
1498:
1480:
1476:
1472:
1465:
1462:
1449:
1445:
1441:
1434:
1431:
1415:
1408:
1401:
1399:
1397:
1393:
1380:
1376:
1370:
1367:
1354:
1350:
1346:
1340:
1337:
1324:
1320:
1314:
1311:
1295:
1291:
1287:
1283:
1282:
1274:
1271:
1255:
1251:
1247:
1243:
1242:
1234:
1231:
1218:
1214:
1210:
1204:
1201:
1188:
1184:
1180:
1174:
1171:
1158:
1154:
1148:
1145:
1132:
1128:
1121:
1118:
1105:
1101:
1097:
1090:
1087:
1074:
1070:
1063:
1060:
1047:
1043:
1041:
1033:
1030:
1026:
1025:archive.today
1022:
1019:
1014:
1007:
1004:
999:
993:
990:
985:
979:
963:
959:
952:
949:
943:
941:
937:
924:
920:
916:
910:
907:
903:
897:
894:
891:
887:
884:
878:
875:
862:
858:
852:
849:
837:
833:
826:
823:
810:
806:
802:
798:
794:
787:
784:
771:
767:
763:
757:
754:
741:
737:
731:
728:
724:
720:
717:
712:
709:
697:
693:
686:
683:
667:
660:
653:
650:
637:
633:
629:
623:
620:
614:
610:
609:Cloud storage
607:
605:
602:
600:
597:
595:
592:
590:
587:
585:
582:
580:
577:
575:
572:
571:
567:
559:
550:
546:
543:This section
541:
538:
534:
533:
527:
525:
523:
519:
515:
511:
510:secret police
505:
504:by the user.
503:
499:
495:
490:
487:
483:
479:
477:
472:
470:
466:
462:
454:
452:
450:
446:
442:
438:
434:
429:
425:
422:
417:
415:
411:
407:
402:
398:
396:
388:
386:
384:
383:cloud storage
376:
374:
372:
368:
364:
360:
356:
351:
349:
344:
340:
336:
332:
328:
323:
320:
316:
312:
309:
305:
301:
297:
292:
290:
286:
282:
276:
272:
264:
262:
260:
256:
252:
246:
244:
241:
237:
232:
227:
225:
221:
217:
213:
209:
202:
200:
196:
193:
187:
184:
180:
172:
170:
168:
164:
156:
154:
152:
144:
142:
140:
136:
131:
128:
121:
119:
117:
113:
109:
104:
100:
92:
87:
85:
83:
82:remote backup
79:
75:
71:
67:
63:
59:
55:
51:
47:
43:
39:
35:
30:
19:
1850:File hosting
1717:Firefox Send
1702:Amazon Drive
1636:Resilio Sync
1631:Proton Drive
1596:iCloud Drive
1586:Google Drive
1483:. Retrieved
1474:
1464:
1452:. Retrieved
1443:
1433:
1421:. Retrieved
1385:29 September
1383:. Retrieved
1369:
1357:. Retrieved
1349:MEGA Privacy
1348:
1339:
1327:. Retrieved
1313:
1301:. Retrieved
1280:
1273:
1261:. Retrieved
1240:
1233:
1221:. Retrieved
1212:
1203:
1191:. Retrieved
1182:
1173:
1161:. Retrieved
1147:
1135:. Retrieved
1120:
1108:. Retrieved
1089:
1077:. Retrieved
1071:. TechWorm.
1062:
1050:. Retrieved
1039:
1032:
1012:
1006:
997:
992:
966:. Retrieved
962:the original
951:
927:. Retrieved
923:the original
909:
896:
877:
865:. Retrieved
851:
839:. Retrieved
835:
825:
813:. Retrieved
796:
786:
774:. Retrieved
765:
756:
744:. Retrieved
740:the original
730:
711:
699:. Retrieved
695:
685:
673:. Retrieved
666:the original
652:
640:. Retrieved
631:
622:
594:File sharing
556:January 2020
553:
549:adding to it
544:
506:
491:
486:de-duplicate
480:
473:
458:
430:
426:
418:
403:
399:
392:
380:
352:
324:
314:
293:
278:
271:File sharing
247:
236:file sharing
228:
212:web services
207:
206:
197:
188:
176:
160:
148:
139:Google Drive
132:
127:File syncing
125:
116:spreadsheets
105:
102:
45:
41:
37:
33:
31:
29:
1762:Peer Impact
1757:Norton Zone
1686:Yandex Disk
1110:10 November
1079:10 November
1052:10 November
766:www.ibm.com
437:append-only
255:JDownloader
243:filesharing
220:hard drives
214:that allow
163:data center
84:solutions.
66:HTTP access
46:cyberlocker
1844:Categories
1787:Ubuntu One
1772:RapidShare
1752:Megaupload
1747:Library.nu
1681:WeTransfer
1303:5 December
1263:5 December
1223:3 December
1193:3 December
968:16 January
929:16 January
836:Cloudwards
746:7 February
615:References
522:cybercrime
449:ransomware
414:encryption
335:indictment
319:DĂĽsseldorf
304:RapidShare
245:services.
70:FTP access
1807:ZumoDrive
1712:FileServe
1671:TitanFile
1661:Syncthing
1656:SugarSync
1651:SpiderOak
1646:ShareFile
1621:Nextcloud
1611:MediaFire
1606:Livedrive
1601:Jumpshare
1581:GameFront
1546:Backblaze
1541:Accellion
1018:s website
996:From the
841:14 August
520:or other
469:SpiderOak
441:data loss
371:MediaFire
367:FileServe
355:Putlocker
259:CryptLoad
183:bandwidth
1823:Category
1767:Pogoplug
1695:Inactive
1676:Tresorit
1571:DocuWare
1479:Archived
1448:Archived
1414:Archived
1379:Archived
1353:Archived
1323:Archived
1294:Archived
1254:Archived
1217:Archived
1187:Archived
1157:Archived
1131:Archived
1104:Archived
1073:Archived
1046:Archived
1021:Archived
978:cite web
886:Archived
861:Archived
809:Archived
770:Archived
719:Archived
701:5 August
675:5 August
642:22 April
636:Archived
568:See also
377:Security
289:download
216:internet
179:gigabyte
135:OneDrive
50:internet
48:, is an
1732:i-drive
1722:Hotfile
1707:Drop.io
1641:Seafile
1576:Dropbox
1566:CloudMe
1561:Cryptee
1001:such").
867:12 July
815:27 June
805:3944667
776:8 March
518:hacking
416:, etc.
341:of its
285:uploads
251:CAPTCHA
192:webmail
1797:Xdrive
1782:Twango
1777:SteekR
1534:Active
1359:5 June
1213:Wasabi
803:
512:of an
445:backup
311:caucus
308:piracy
300:German
224:server
58:upload
1792:Wuala
1742:LIBOX
1737:iDisk
1727:Humyo
1485:8 May
1454:8 May
1423:8 May
1417:(PDF)
1410:(PDF)
1329:8 May
1297:(PDF)
1257:(PDF)
1163:8 May
1137:8 May
1016:'
669:(PDF)
662:(PDF)
419:Many
296:Swiss
78:image
74:video
54:files
44:, or
1616:Mega
1487:2013
1456:2013
1425:2013
1387:2014
1361:2019
1331:2013
1305:2023
1265:2023
1225:2019
1195:2019
1165:2013
1139:2013
1112:2016
1100:CNET
1081:2016
1054:2014
984:link
970:2011
931:2011
919:RIAA
869:2011
843:2023
817:2023
801:SSRN
778:2023
748:2007
703:2014
677:2014
644:2022
498:MPAA
494:RIAA
465:MEGA
443:for
433:ACLs
348:Mega
273:and
137:and
108:PDFs
88:Uses
76:and
1556:Box
1286:doi
1246:doi
551:.
240:P2P
231:URL
1846::
1477:.
1473:.
1446:.
1442:.
1395:^
1377:.
1351:.
1347:.
1292:.
1252:.
1211:.
1185:.
1181:.
1102:.
1098:.
980:}}
976:{{
939:^
917:.
859:.
834:.
807:.
799:.
795:.
768:.
764:.
694:.
634:.
630:.
524:.
496:,
373:.
350:.
261:.
110:,
40:,
32:A
1519:e
1512:t
1505:v
1489:.
1458:.
1427:.
1389:.
1363:.
1333:.
1307:.
1288::
1267:.
1248::
1227:.
1197:.
1167:.
1141:.
1114:.
1083:.
1056:.
986:)
933:.
871:.
845:.
819:.
780:.
750:.
705:.
679:.
646:.
558:)
554:(
298:–
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.