• Home
  • Shop
  • Privacy Policy
  • Terms and Conditions
Tech News, Magazine & Review WordPress Theme 2017
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
No Result
View All Result
Blog - Creative Collaboration
No Result
View All Result
Home Internet

Mega says it can’t decrypt your files. New POC exploit shows otherwise

June 21, 2022
Share on FacebookShare on Twitter

In the decade since larger-than-life character Kim Dotcom founded Mega, the cloud storage service has amassed 250 million registered users and stores a whopping 120 billion files that take up more than 1,000 petabytes of storage. A key selling point that has helped fuel the growth is an extraordinary promise that no top-tier Mega competitors make: Not even Mega can decrypt the data it stores.

On the company’s homepage, for instance, Mega displays an image that compares its offerings to Dropbox and Google Drive. In addition to noting Mega’s lower prices, the comparison emphasizes that Mega offers end-to-end encryption, whereas the other two do not.

Over the years, the company has repeatedly reminded the world of this supposed distinction, which is perhaps best summarized in this blog post. In it, the company claims, “As long as you ensure that your password is sufficiently strong and unique, no one will ever be able to access your data on MEGA. Even in the exceptionally improbable event MEGA’s entire infrastructure is seized!” (emphasis added).

Third-party reviewers have been all too happy to agree and to cite the Mega claim when recommending the service.

A decade of assurances negated

Research published on Tuesday shows there’s no truth to the claim that Mega, or an entity with control over Mega’s infrastructure, is unable to access data stored on the service. The authors say that the architecture Mega uses to encrypt files is riddled with fundamental cryptography flaws that make it trivial for anyone with control of the platform to perform a full key recovery attack on users once they have logged in a sufficient number of times. With that, the malicious party can decipher stored files or even upload incriminating or otherwise malicious files to an account; these files look indistinguishable from genuinely uploaded data.

Advertisement

“We show that MEGA’s system does not protect its users against a malicious server and present five distinct attacks, which together allow for a full compromise of the confidentiality of user files,” the researchers wrote on a website. “Additionally, the integrity of user data is damaged to the extent that an attacker can insert malicious files of their choice which pass all authenticity checks of the client. We built proof-of-concept versions of all the attacks, showcasing their practicality and exploitability.”

After receiving the researchers’ report privately in March, Mega on Tuesday began rolling out an update that makes it harder to perform the attacks. But the researchers warn that the patch provides only an “ad hoc” means for thwarting their key-recovery attack and does not fix the key reuse issue, lack of integrity checks, and other systemic problems they identified. With the researchers’ precise key-recovery attack no longer possible, the other exploits described in the research are no longer possible, either, but the lack of a comprehensive fix is a source of concern for them.

“This means that if the preconditions for the other attacks are fulfilled in some different way, they can still be exploited,” the researchers wrote in an email. “Hence we do not endorse this patch, but the system will no longer be vulnerable to the exact chain of attacks that we proposed.”

Mega has published an advisory here. However, the chairman of the service says that he has no plans to revise promises that the company cannot access customer data.

“For a short time, there was potential for an attacker to negate our commitment, in very limited circumstances and for a very few users, but that has now been fixed,” the chairman, Stephen Hall, wrote in an email.

Next Post

The Motorola Razr 3 battery capacity might disappoint, according to a new leak

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Click Here!

Recent News.

This 4K camera drone is on sale for under $100

August 18, 2022

Tesla asks Chinese government to help secure power to suppliers

August 18, 2022

The best keyboards for Chromebooks 2022

August 18, 2022

Golf in your dorm with this smart golf home simulator

August 18, 2022

Mobile .

‘Back-to-school necklace’ references may be a sign your child is struggling

August 18, 2022

WebMD acquires French medical news and information platform Jim.fr – TechCrunch

August 18, 2022

Why is Ethereum’s The Merge the most important event in crypto this year?

August 18, 2022

Google brings its Workspace Individual plan to one-person businesses in Europe – TechCrunch

August 18, 2022

Recent News

This 4K camera drone is on sale for under $100

August 18, 2022

Tesla asks Chinese government to help secure power to suppliers

August 18, 2022

Sci-Fi

Golf in your dorm with this smart golf home simulator

August 18, 2022
No Result
View All Result

Categories

  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi
  • Home
  • Shop
  • Privacy Policy
  • Terms and Conditions

© CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

No Result
View All Result
  • Home
  • Blog
  • Android
  • Cars
  • Gadgets
  • Gaming
  • Internet
  • Mobile
  • Sci-Fi

© CC Startup, Powered by Creative Collaboration. © 2020 Creative Collaboration, LLC. All Rights Reserved.

Get more stuff like this
in your inbox

Subscribe to our mailing list and get interesting stuff and updates to your email inbox.

Thank you for subscribing.

Something went wrong.

We respect your privacy and take protecting it seriously