<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style></head>
<body class='hmmessage'><div dir='ltr'>
Guys, please read these (or listen to the podcasts): <br>http://www.grc.com/sn/sn-256.htm<br>http://www.grc.com/sn/sn-257.htm<br><br>Things being said seem to conflict with what I learned from this episode of security now on how lastpass works. Essentially: LastPass is very secure and no one can access the data except the user.<br><br><br><br><div><div id="SkyDrivePlaceholder"></div>> Date: Fri, 23 Mar 2012 18:25:04 -0500<br>> Subject: Re: Ubuntu One needs cloud encryption like LastPass does it<br>> From: jordon@envygeeks.com<br>> To: smickson@hotmail.com<br>> CC: ubuntu-devel-discuss@lists.ubuntu.com<br>> <br>> On Fri, Mar 23, 2012 at 1:34 PM, Sam Smith <smickson@hotmail.com> wrote:<br>> > Everything you said, you can do with LastPass: "make it more convenient,<br>> > access your files from anywhere (including the website), stream your own<br>> > music, share your files"<br>> ><br>> > Using secure encryption that occurs on the computer before it leaves for the<br>> > cloud does not prevent any of the things you seem to think it does.<br>> <br>> The other gentleman is correct, for a service to be considered secure,<br>> in real world terms and real world application you would not have<br>> access to your data in decrypted form via a website, you would only be<br>> able to download the encrypted pieces.<br>> <br>> Secure encryption is not so secure when you decrypt it from a website<br>> using a server that you originally tried to avoid having encrypt it.<br>> What I am saying is, what is so secure about the encryption you are<br>> using if you let a third party decrypt it, one that can obviously<br>> intercept your key quite easily and decrypt it anytime they want to.<br>> It's no more secure then just having them encrypt it with their own<br>> keys that they make up for you, sort of like drop box. Actually, it's<br>> a false sense of security they are giving you at this point, and in my<br>> eyes a fraudulent claim of being more secure then others because 'you<br>> control the encryption key' when in all honest opinions, they could<br>> just intercept it anytime they wanted to so you are back to square<br>> one. At this point, secure is out the door, and it's just become<br>> another drop box, actually, one that just hasn't been called out about<br>> it yet. Be round-a-bout with your terminology all you want so people<br>> don't realise that they are no more secure then they were but the<br>> truth is still there when you read between the evasion.<br>> <br>> The short of the short is, for a service to be truly secure the<br>> company hosting it must not have access to any of the encryption keys<br>> and only the encrypted data, your data is either encrypted and<br>> unavailable, period, or your data is decrypted and available, not a<br>> false sense of security where Jim thinks he's secure because he<br>> controls the encryption key, not realising that the company claiming<br>> he's more secure because he controls the encryption key, can in fact<br>> intercept said key anytime they want to. It's not security, it's<br>> not-so-clever marketing.<br>> <br>> -- <br>> Ubuntu-devel-discuss mailing list<br>> Ubuntu-devel-discuss@lists.ubuntu.com<br>> Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel-discuss<br></div> </div></body>
</html>