452:, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage. This form of encryption is rapidly gaining popularity, with companies such as
526:
489:, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of
311:
which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
1808:
1816:
961:. Citation from ruling: "Es ist davon auszugehen, dass die weit überwiegende Zahl von Nutzern die Speicherdienste zu legalen Zwecken einsetzen und die Zahl der missbräuchlichen Nutzer in der absoluten Minderheit ist." ("It is to be expected that the vast majority of users use the storage services for lawful purposes and the number of abusive users are in the absolute minority.").
477:
data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular
222:
which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. As of 2005 these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although
389:
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection, and the physical integrity of the provider's data center, to the financial stability of the storage provider (because, even if perfectly
187:
Many providers offer tiered storage levels, charging differently based on frequency of access and retrieval latency. There may be a different cost associated with access vs storage. For example, in a cold storage scenario, the price per GB stored over time can be very low, but it may take longer to
334:
as being evidence showing a criminal intent and venture. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and
174:
cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended
496:
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by
Attorney Rick G. Sanders of Aaron | Sanders PLLC in regards to the iTunes Match "Honeypot" discussion, that a warrant to
310:
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users
237:
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting,
118:
and sharing services allow users to create special folders on each of their computers or mobile devices, which are then synchronized across all devices. Files placed in this folder can be accessed through a website or mobile app and easily shared with others for viewing or collaboration.
183:
services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
1334:"MEGA has been designed around user-controlled end-to-end encryption. MEGA's end-to-end encryption (E2EE) paradigm enhances the overall security by providing 'privacy by design', unlike many of its competitors who only provide 'privacy by policy'"
416:
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
989:
ruling: "entspricht einem
Generalverdacht gegen Sharehoster-Dienste und ihre Nutzer, der so nicht zu rechtfertigen ist" ("corresponds to a general suspicion against shared hosting services and their users, which is not to justify
178:
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
497:
search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
412:
state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage how the encryption is implemented is very important.
707:
302:
declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case
1145:
92:
Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected.
1467:
624:
1436:
473:
derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files. This enables the cloud storage provider to
428:, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of
849:
335:
defendants' communications discussing their own evasion and infringement issues. As of 2014 the case has not yet been heard. A year later, Megaupload.com relaunched as
1092:
647:
1311:
150:
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing copies of important files offsite in a secure
704:
1061:
903:
107:. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use.
1141:
1009:
386:, and may be expressed with questions of the kind: Will the user be able to continue accessing their data? Who else can access it? Who can change it?
1459:
1268:
616:
1119:
1428:
1282:
874:
425:
1506:
536: with: Deals with the questions: Who owns the data the user uploads? Will the act of uploading change the ownership?. You can help by
188:
access an item at a higher per GB retrieval cost. In some cases, users may have to commit to retrieval being much higher latency as well.
797:
567:
1228:
1402:
95:
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
845:
758:
946:
1034:
890:
724:
680:
347:
1205:
572:
1819:
562:
390:
fit from a technical point of view, if the provider financially goes out of business, then its services go offline too).
315:
87:
1242:
1084:
1499:
654:
577:
374:
services has prompted much discussion on security. Security, as it relates to cloud storage can be broken down into:
242:
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
1367:
1307:
296:
1057:
972:
911:
1492:
263:
999:
537:
1848:
1115:
1175:
506:
1341:
871:
782:"The Right not to Forget: Cloud Based Services Moratoriums in War Zones and Data Portability Rights"
1843:
219:
139:
587:
394:
490:
58:
793:
781:
130:
have made file hosting and sharing more accessible and popular for personal and business use.
49:
files that can be accessed over the internet after providing a username and password or other
1838:
1811:
470:
409:
383:
171:
70:
66:
62:
1515:
449:
398:
327:
115:
935:
Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.
820:
8:
1395:
904:"RIAA joins congressional caucus in unveiling first-ever list of notorious illegal sites"
421:
326:
concluded that
Megaupload differed from other online file storage businesses, suggesting
1267:
Pont, J.; Abu Oun, O.; Brierley, C.; Arief, B.; Hernandez-Castro, J. (1 November 2019).
474:
464:
351:
212:
750:
481:
Some point out that there is a theoretical possibility that organizations such as the
393:
The question of who can access and, potentially, change, their data, ranges from what
354:
listed
Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
966:
789:
950:
1790:
1785:
1274:
1234:
1026:
502:
155:
728:
505:
who could potentially gain access to the encrypted files through various forms of
1579:
1197:
878:
711:
592:
208:
1278:
1654:
1604:
453:
336:
331:
319:
100:
50:
436:
policies in the event that the computer being backed-up becomes infected with
1832:
1765:
1544:
1539:
1226:
1013:
597:
498:
371:
42:
1460:"Is iTunes Match a honeypot for music pirates? A copyright lawyer weighs in"
1238:
307:
1705:
1690:
1624:
1619:
1574:
582:
269:
259:
228:
224:
127:
61:. Other related services include content-displaying hosting services (i.e.
1429:"Bitcasa: Infinite storage comes to your desktop, but so do big questions"
1058:"Yet Another Video Streaming Service Bites The Dust, Putlocker Shuts Down"
142:. This is especially common for companies with a major internet presence.
1750:
1745:
1674:
284:
243:
231:
200:
151:
104:
1484:
1363:
1266:
525:
1775:
1760:
1740:
1735:
1669:
1394:
Storer, Mark W.; Greenan, Kevin; Long, Darrell D. E.; Miller, Ethan L.
510:
437:
402:
323:
292:
870:
Nikiforakis N., Balduzzi M. Van Acker S., Joosen W. and
Balzarotti D.
1795:
1700:
1659:
1649:
1644:
1639:
1634:
1609:
1599:
1594:
1589:
1584:
1569:
1534:
1529:
457:
429:
359:
355:
343:
272:
without consent of the copyright owner. In such cases one individual
247:
1227:
Kolodenker, E.; Koch, W.; Stringhini, G.; Egele, M. (2 April 2017).
138:
Content providers who encounter bandwidth congestion issues may use
1755:
1664:
1614:
1559:
1142:"Cloud Data Storage, Encryption and Data Protection Best Practices"
478:
file simply by encrypting it themselves and comparing the outputs.
277:
204:
167:
154:, they can quickly recover from data loss due to hardware failure,
123:
38:
821:"Hot Storage vs Cold Storage in 2023: Instant Access vs Archiving"
322:
and commenced criminal cases against its owners and others. Their
1720:
1710:
1695:
1629:
1564:
1554:
1549:
288:
239:
180:
1364:"SpiderOak - Zero Knowledge Privacy with Encrypted Cloud Backup"
846:"Cyberlockers Take Over File-Sharing Lead From BitTorrent Sites"
1770:
993:
433:
299:
295:, in 2010 the US government's congressional international anti-
273:
46:
1270:
A Roadmap for
Improving the Impact of Anti-ransomware Research
1085:"MPAA wants more criminal cases brought against 'rogue' sites"
463:
Since secret key encryption results in unique files, it makes
223:
one-click hosting can be used for many purposes, this type of
140:
specialized services for distributing cached or static content
1780:
1730:
1725:
1715:
350:
for being a major piracy threat, and in 2012 Alfred Perry of
1389:
1387:
1385:
1167:
1333:
1088:
907:
486:
482:
199:, sometimes referred to as cyberlocker generally describes
54:
1382:
96:
460:
being entirely zero knowledge file storage and sharing.
440:
capable of deleting or encrypting the victim's backups.
276:
a file to a file hosting service, which others can then
238:
maximum download speed etc. Many such sites implement a
786:
Rights to
Privacy and Data Protection in Armed Conflict
166:
Some online file storage services offer space on a per-
872:"Exposing the Lack of Privacy in File Hosting Services
211:(or from a remote location) onto the one-click host's
1168:"BorgBase - Secure hosting for your BorgBackup Repos"
931:
929:
648:"Cloud Storage: File Hosting and Synchronisation 2.0"
467:
impossible and therefore may use more storage space.
1308:"5 Ways To Securely Encrypt Your Files in the Cloud"
751:"Introduction to Backup and Disaster Recovery | IBM"
207:
users to easily upload one or more files from their
1393:
1113:
397:are in place in the provider's data center to what
41:hosting service specifically designed to host user
1230:PayBreak: Defense Against Cryptographic Ransomware
926:
705:How to transfer files from Dropbox to Google Drive
448:Secret key encryption is sometimes referred to as
424:for application keys. One important permission is
253:
110:
1830:
377:
268:File hosting services may be used as a means to
681:"How Dropbox Could Rule a Multi-Platform World"
145:
1500:
1356:
1300:
1107:
1457:
1426:
420:Some cloud storage providers offer granular
1031:, Crim. No. 1:12CR3 (E.D. Va. O'Grady, J.)"
568:Comparison of file synchronization software
318:seized and shut down the file hosting site
1815:
1507:
1493:
1134:
1514:
1000:Department of Justice indictment, on the
944:
280:. Legal assessments can be very diverse.
175:after a predefined period of inactivity.
53:. Typically, file hosting services allow
1082:
818:
81:
1273:. ResearchGate GmbH. pp. 137–154.
1033:. United States Department of Justice.
246:, FreeRapid, Mipony, Tucan Manager and
227:has, to a degree, come to compete with
16:Internet hosting service for user files
1831:
1055:
891:"Piracy Beyond P2P: One-Click Hosters"
779:
304:Atari Europe S.A.S.U. v. Rapidshare AG
1488:
1114:Jonathan Strickland (30 April 2008).
800:from the original on 22 December 2021
516:
348:Motion Picture Association of America
1288:from the original on 3 December 2019
1260:
1248:from the original on 22 October 2020
1220:
1208:from the original on 3 December 2019
1178:from the original on 3 December 2019
1064:from the original on 19 October 2016
1037:from the original on 27 October 2014
678:
573:Comparison of online backup services
520:
191:
1820:Comparison of file hosting services
1408:from the original on 22 August 2013
1370:from the original on 9 October 2014
1172:BorgBase - Simple Borg Repo Hosting
563:Comparison of file hosting services
316:United States Department of Justice
218:Most such services simply return a
88:Comparison of file hosting services
13:
1458:Brad McCarty (16 September 2011).
1427:Brad McCarty (23 September 2011).
1122:from the original on 29 April 2013
1029:United States v. Kim Dotcom, et al
819:Stockton, Ben (20 November 2020).
780:Cahane, Amir (15 September 2021).
617:"Share OneDrive files and folders"
578:Comparison of online music lockers
443:
161:
133:
14:
1860:
1470:from the original on 8 March 2016
1439:from the original on 22 July 2016
1344:from the original on 14 June 2019
1095:from the original on 9 March 2018
1056:Prabhu, Vijay (17 October 2016).
1027:"Release For Victim Notification
852:from the original on 17 July 2011
1814:
1807:
1806:
1083:Sandoval, Greg (31 March 2012).
761:from the original on 5 June 2023
645:
627:from the original on 2 June 2023
524:
384:confidentiality and availability
314:By contrast in January 2012 the
45:. These services allow users to
1451:
1420:
1326:
1314:from the original on 7 May 2013
1190:
1160:
1148:from the original on 2 May 2013
1076:
1049:
1019:
979:
945:Roettgers, Janko (3 May 2010).
938:
896:
883:
864:
399:technical steps have been taken
170:basis, and sometimes include a
1310:. Makeuseof.com. 26 May 2012.
838:
812:
773:
743:
717:
698:
672:
639:
609:
342:In 2016 the file hosting site
254:Use for copyright infringement
158:, or other unexpected events.
111:File sync and sharing services
1:
910:. 19 May 2010. Archived from
603:
378:Access and integrity security
264:Legal aspects of file sharing
1198:"Why Use Immutable Storage?"
949:. Gigaom.com. Archived from
893:, Retrieved: 5 January 2008.
714:. Retrieved 24 December 2014
679:Metz, Rachel (9 July 2013).
456:(previously Megaupload) and
283:For example, in the case of
146:Backup and disaster recovery
31:online file-storage provider
7:
1396:"Secure Data Deduplication"
1279:10.1007/978-3-030-35055-0_9
556:
382:Deals with the question of
365:
328:a number of design features
10:
1865:
971:: CS1 maint: postscript (
947:"RapidShare Wins in Court"
401:, such as access control,
257:
122:Consumer products such as
85:
1804:
1683:
1522:
1116:"How Cloud Storage Works"
877:15 September 2011 at the
270:distribute or share files
710:12 November 2016 at the
395:physical access controls
69:), virtual storage, and
1239:10.1145/3052973.3053035
588:List of backup software
76:
491:copyright infringement
410:cloud storage services
346:has been noted by the
1516:File hosting services
1233:. ResearchGate GmbH.
1204:. 11 September 2018.
685:MIT Technology Review
503:oppressive government
471:Convergent encryption
291:file hosting service
86:Further information:
82:Personal file storage
57:, and in some cases,
27:cloud-storage service
1016:– see sections 7–14.
358:, Depositfiles, and
23:file-hosting service
1118:. How Stuff Works.
1002:Wall Street Journal
987:Atari v. RapidShare
953:on 26 February 2011
1849:Records management
1615:Microsoft OneDrive
1144:. Techtarget.com.
914:on 26 October 2017
889:Roettgers, Janko.
517:Ownership security
465:data deduplication
352:Paramount Pictures
1826:
1825:
1401:. Ssrc.ucsc.edu.
621:Microsoft Support
554:
553:
370:The emergence of
197:One-click hosting
192:One-click hosting
156:natural disasters
1856:
1818:
1817:
1810:
1809:
1791:Yahoo! Briefcase
1509:
1502:
1495:
1486:
1485:
1480:
1479:
1477:
1475:
1455:
1449:
1448:
1446:
1444:
1424:
1418:
1417:
1415:
1413:
1407:
1400:
1391:
1380:
1379:
1377:
1375:
1360:
1354:
1353:
1351:
1349:
1330:
1324:
1323:
1321:
1319:
1304:
1298:
1297:
1295:
1293:
1287:
1264:
1258:
1257:
1255:
1253:
1247:
1224:
1218:
1217:
1215:
1213:
1194:
1188:
1187:
1185:
1183:
1164:
1158:
1157:
1155:
1153:
1138:
1132:
1131:
1129:
1127:
1111:
1105:
1104:
1102:
1100:
1080:
1074:
1073:
1071:
1069:
1053:
1047:
1046:
1044:
1042:
1023:
1017:
1012:15 July 2012 at
1006:
997:
991:
983:
977:
976:
970:
962:
960:
958:
942:
936:
933:
924:
923:
921:
919:
900:
894:
887:
881:
868:
862:
861:
859:
857:
842:
836:
835:
833:
831:
816:
810:
809:
807:
805:
777:
771:
770:
768:
766:
747:
741:
740:
738:
736:
731:on 13 March 2007
727:. Archived from
721:
715:
702:
696:
695:
693:
691:
676:
670:
669:
667:
665:
659:
653:. Archived from
652:
646:Geel, Matthias.
643:
637:
636:
634:
632:
613:
549:
546:
528:
521:
306:in Germany, the
215:free of charge.
25:, also known as
1864:
1863:
1859:
1858:
1857:
1855:
1854:
1853:
1844:Social software
1829:
1828:
1827:
1822:
1800:
1679:
1580:IBM Connections
1518:
1513:
1483:
1473:
1471:
1456:
1452:
1442:
1440:
1425:
1421:
1411:
1409:
1405:
1398:
1392:
1383:
1373:
1371:
1362:
1361:
1357:
1347:
1345:
1332:
1331:
1327:
1317:
1315:
1306:
1305:
1301:
1291:
1289:
1285:
1265:
1261:
1251:
1249:
1245:
1225:
1221:
1211:
1209:
1196:
1195:
1191:
1181:
1179:
1166:
1165:
1161:
1151:
1149:
1140:
1139:
1135:
1125:
1123:
1112:
1108:
1098:
1096:
1081:
1077:
1067:
1065:
1054:
1050:
1040:
1038:
1025:
1024:
1020:
1004:
998:
994:
984:
980:
964:
963:
956:
954:
943:
939:
934:
927:
917:
915:
902:
901:
897:
888:
884:
879:Wayback Machine
869:
865:
855:
853:
844:
843:
839:
829:
827:
817:
813:
803:
801:
778:
774:
764:
762:
749:
748:
744:
734:
732:
723:
722:
718:
712:Wayback Machine
703:
699:
689:
687:
677:
673:
663:
661:
660:on 31 July 2017
657:
650:
644:
640:
630:
628:
615:
614:
610:
606:
593:Shared resource
559:
550:
544:
541:
534:needs expansion
519:
446:
444:Data encryption
380:
368:
332:operating model
266:
258:Main articles:
256:
194:
164:
162:Storage charges
148:
136:
134:Content caching
113:
103:documents, and
90:
84:
79:
17:
12:
11:
5:
1862:
1852:
1851:
1846:
1841:
1824:
1823:
1805:
1802:
1801:
1799:
1798:
1793:
1788:
1783:
1778:
1773:
1768:
1763:
1758:
1753:
1748:
1743:
1738:
1733:
1728:
1723:
1718:
1713:
1708:
1703:
1698:
1693:
1687:
1685:
1681:
1680:
1678:
1677:
1672:
1667:
1662:
1657:
1655:Tencent Weiyun
1652:
1647:
1642:
1637:
1632:
1627:
1622:
1617:
1612:
1607:
1602:
1597:
1592:
1587:
1582:
1577:
1572:
1567:
1562:
1557:
1552:
1547:
1542:
1537:
1532:
1526:
1524:
1520:
1519:
1512:
1511:
1504:
1497:
1489:
1482:
1481:
1464:TheNextWeb.com
1450:
1433:TheNextWeb.com
1419:
1381:
1355:
1325:
1299:
1259:
1219:
1189:
1159:
1133:
1106:
1075:
1048:
1018:
992:
978:
937:
925:
895:
882:
863:
837:
811:
772:
742:
725:"Macworld.com"
716:
697:
671:
638:
607:
605:
602:
601:
600:
595:
590:
585:
580:
575:
570:
565:
558:
555:
552:
551:
531:
529:
518:
515:
450:zero knowledge
445:
442:
379:
376:
367:
364:
320:Megaupload.com
255:
252:
193:
190:
163:
160:
147:
144:
135:
132:
112:
109:
101:word processor
83:
80:
78:
75:
51:authentication
15:
9:
6:
4:
3:
2:
1861:
1850:
1847:
1845:
1842:
1840:
1837:
1836:
1834:
1821:
1813:
1803:
1797:
1794:
1792:
1789:
1787:
1784:
1782:
1779:
1777:
1774:
1772:
1769:
1767:
1764:
1762:
1759:
1757:
1754:
1752:
1749:
1747:
1744:
1742:
1739:
1737:
1734:
1732:
1729:
1727:
1724:
1722:
1719:
1717:
1714:
1712:
1709:
1707:
1704:
1702:
1699:
1697:
1694:
1692:
1689:
1688:
1686:
1682:
1676:
1673:
1671:
1668:
1666:
1663:
1661:
1658:
1656:
1653:
1651:
1648:
1646:
1643:
1641:
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1596:
1593:
1591:
1588:
1586:
1583:
1581:
1578:
1576:
1573:
1571:
1568:
1566:
1563:
1561:
1558:
1556:
1553:
1551:
1548:
1546:
1543:
1541:
1540:Baidu Wangpan
1538:
1536:
1533:
1531:
1528:
1527:
1525:
1521:
1517:
1510:
1505:
1503:
1498:
1496:
1491:
1490:
1487:
1469:
1465:
1461:
1454:
1438:
1434:
1430:
1423:
1404:
1397:
1390:
1388:
1386:
1369:
1365:
1359:
1343:
1339:
1335:
1329:
1313:
1309:
1303:
1284:
1280:
1276:
1272:
1271:
1263:
1244:
1240:
1236:
1232:
1231:
1223:
1207:
1203:
1199:
1193:
1177:
1173:
1169:
1163:
1147:
1143:
1137:
1121:
1117:
1110:
1094:
1090:
1086:
1079:
1063:
1059:
1052:
1036:
1032:
1030:
1022:
1015:
1014:archive.today
1011:
1008:
1003:
996:
988:
982:
974:
968:
952:
948:
941:
932:
930:
913:
909:
905:
899:
892:
886:
880:
876:
873:
867:
851:
847:
841:
826:
822:
815:
799:
795:
791:
787:
783:
776:
760:
756:
752:
746:
730:
726:
720:
713:
709:
706:
701:
686:
682:
675:
656:
649:
642:
626:
622:
618:
612:
608:
599:
598:Cloud storage
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
561:
560:
548:
539:
535:
532:This section
530:
527:
523:
522:
514:
512:
508:
504:
500:
499:secret police
494:
493:by the user.
492:
488:
484:
479:
476:
472:
468:
466:
461:
459:
455:
451:
441:
439:
435:
431:
427:
423:
418:
414:
411:
406:
404:
400:
396:
391:
387:
385:
375:
373:
372:cloud storage
363:
361:
357:
353:
349:
345:
340:
338:
333:
329:
325:
321:
317:
312:
309:
305:
301:
298:
294:
290:
286:
281:
279:
275:
271:
265:
261:
251:
249:
245:
241:
235:
233:
230:
226:
221:
216:
214:
210:
206:
202:
198:
189:
185:
182:
176:
173:
169:
159:
157:
153:
143:
141:
131:
129:
125:
120:
117:
108:
106:
102:
98:
93:
89:
74:
72:
71:remote backup
68:
64:
60:
56:
52:
48:
44:
40:
36:
32:
28:
24:
19:
1839:File hosting
1706:Firefox Send
1691:Amazon Drive
1625:Resilio Sync
1620:Proton Drive
1585:iCloud Drive
1575:Google Drive
1472:. Retrieved
1463:
1453:
1441:. Retrieved
1432:
1422:
1410:. Retrieved
1374:29 September
1372:. Retrieved
1358:
1346:. Retrieved
1338:MEGA Privacy
1337:
1328:
1316:. Retrieved
1302:
1290:. Retrieved
1269:
1262:
1250:. Retrieved
1229:
1222:
1210:. Retrieved
1201:
1192:
1180:. Retrieved
1171:
1162:
1150:. Retrieved
1136:
1124:. Retrieved
1109:
1097:. Retrieved
1078:
1066:. Retrieved
1060:. TechWorm.
1051:
1039:. Retrieved
1028:
1021:
1001:
995:
986:
981:
955:. Retrieved
951:the original
940:
916:. Retrieved
912:the original
898:
885:
866:
854:. Retrieved
840:
828:. Retrieved
824:
814:
802:. Retrieved
785:
775:
763:. Retrieved
754:
745:
733:. Retrieved
729:the original
719:
700:
688:. Retrieved
684:
674:
662:. Retrieved
655:the original
641:
629:. Retrieved
620:
611:
583:File sharing
545:January 2020
542:
538:adding to it
533:
495:
480:
475:de-duplicate
469:
462:
447:
419:
415:
407:
392:
388:
381:
369:
341:
313:
303:
282:
267:
260:File sharing
236:
225:file sharing
217:
201:web services
196:
195:
186:
177:
165:
149:
137:
128:Google Drive
121:
116:File syncing
114:
105:spreadsheets
94:
91:
34:
30:
26:
22:
20:
18:
1751:Peer Impact
1746:Norton Zone
1675:Yandex Disk
1099:10 November
1068:10 November
1041:10 November
755:www.ibm.com
426:append-only
244:JDownloader
232:filesharing
209:hard drives
203:that allow
152:data center
73:solutions.
55:HTTP access
35:cyberlocker
1833:Categories
1776:Ubuntu One
1761:RapidShare
1741:Megaupload
1736:Library.nu
1670:WeTransfer
1292:5 December
1252:5 December
1212:3 December
1182:3 December
957:16 January
918:16 January
825:Cloudwards
735:7 February
604:References
511:cybercrime
438:ransomware
403:encryption
324:indictment
308:DĂĽsseldorf
293:RapidShare
234:services.
59:FTP access
1796:ZumoDrive
1701:FileServe
1660:TitanFile
1650:Syncthing
1645:SugarSync
1640:SpiderOak
1635:ShareFile
1610:Nextcloud
1600:MediaFire
1595:Livedrive
1590:Jumpshare
1570:GameFront
1535:Backblaze
1530:Accellion
1007:s website
985:From the
830:14 August
509:or other
458:SpiderOak
430:data loss
360:MediaFire
356:FileServe
344:Putlocker
248:CryptLoad
172:bandwidth
1812:Category
1756:Pogoplug
1684:Inactive
1665:Tresorit
1560:DocuWare
1468:Archived
1437:Archived
1403:Archived
1368:Archived
1342:Archived
1312:Archived
1283:Archived
1243:Archived
1206:Archived
1176:Archived
1146:Archived
1120:Archived
1093:Archived
1062:Archived
1035:Archived
1010:Archived
967:cite web
875:Archived
850:Archived
798:Archived
759:Archived
708:Archived
690:5 August
664:5 August
631:22 April
625:Archived
557:See also
366:Security
278:download
205:internet
168:gigabyte
124:OneDrive
39:internet
37:, is an
1721:i-drive
1711:Hotfile
1696:Drop.io
1630:Seafile
1565:Dropbox
1555:CloudMe
1550:Cryptee
990:such").
856:12 July
804:27 June
794:3944667
765:8 March
507:hacking
405:, etc.
330:of its
274:uploads
240:CAPTCHA
181:webmail
1786:Xdrive
1771:Twango
1766:SteekR
1523:Active
1348:5 June
1202:Wasabi
792:
501:of an
434:backup
300:caucus
297:piracy
289:German
213:server
47:upload
1781:Wuala
1731:LIBOX
1726:iDisk
1716:Humyo
1474:8 May
1443:8 May
1412:8 May
1406:(PDF)
1399:(PDF)
1318:8 May
1286:(PDF)
1246:(PDF)
1152:8 May
1126:8 May
1005:'
658:(PDF)
651:(PDF)
408:Many
285:Swiss
67:image
63:video
43:files
33:, or
1605:Mega
1476:2013
1445:2013
1414:2013
1376:2014
1350:2019
1320:2013
1294:2023
1254:2023
1214:2019
1184:2019
1154:2013
1128:2013
1101:2016
1089:CNET
1070:2016
1043:2014
973:link
959:2011
920:2011
908:RIAA
858:2011
832:2023
806:2023
790:SSRN
767:2023
737:2007
692:2014
666:2014
633:2022
487:MPAA
483:RIAA
454:MEGA
432:for
422:ACLs
337:Mega
262:and
126:and
97:PDFs
77:Uses
65:and
1545:Box
1275:doi
1235:doi
540:.
229:P2P
220:URL
1835::
1466:.
1462:.
1435:.
1431:.
1384:^
1366:.
1340:.
1336:.
1281:.
1241:.
1200:.
1174:.
1170:.
1091:.
1087:.
969:}}
965:{{
928:^
906:.
848:.
823:.
796:.
788:.
784:.
757:.
753:.
683:.
623:.
619:.
513:.
485:,
362:.
339:.
250:.
99:,
29:,
21:A
1508:e
1501:t
1494:v
1478:.
1447:.
1416:.
1378:.
1352:.
1322:.
1296:.
1277::
1256:.
1237::
1216:.
1186:.
1156:.
1130:.
1103:.
1072:.
1045:.
975:)
922:.
860:.
834:.
808:.
769:.
739:.
694:.
668:.
635:.
547:)
543:(
287:–
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.