Knowledge

File-hosting service

Source đź“ť

452:, meaning that only the user has the encryption key needed to decrypt the data. Since data is encrypted using the secret key, identical files encrypted with different keys will be different. To be truly zero knowledge, the file hosting service must not be able to store the user's passwords or see their data even with physical access to the servers. For this reason, secret key encryption is considered the highest level of access security in cloud storage. This form of encryption is rapidly gaining popularity, with companies such as 526: 489:, or a government could obtain a warrant for US law enforcement to access the cloud storage provider's servers and gain access to the encrypted files belonging to a user. By demonstrating to a court how applying the convergent encryption methodology to an unencrypted copyrighted file produces the same encrypted file as that possessed by the user would appear to make a strong case that the user is guilty of possessing the file in question and thus providing evidence of 311:
which is not justified". The court also observed that the site removes copyrighted material when asked, does not provide search facilities for illegal material, noted previous cases siding with RapidShare, and after analysis the court concluded that the plaintiff's proposals for more strictly preventing sharing of copyrighted material – submitted as examples of anti-piracy measures RapidShare might have adopted – were found to be "unreasonable or pointless".
1808: 1816: 961:. Citation from ruling: "Es ist davon auszugehen, dass die weit überwiegende Zahl von Nutzern die Speicherdienste zu legalen Zwecken einsetzen und die Zahl der missbräuchlichen Nutzer in der absoluten Minderheit ist." ("It is to be expected that the vast majority of users use the storage services for lawful purposes and the number of abusive users are in the absolute minority."). 477:
data blocks, meaning only one instance of a unique file (such as a document, photo, music or movie file) is actually stored on the cloud servers but made accessible to all uploaders. A third party who gained access to the encrypted files could thus easily determine if a user has uploaded a particular
222:
which can be given to other people, who can then fetch the file later. In many cases these URLs are predictable allowing potential misuse of the service. As of 2005 these sites have drastically increased in popularity, and subsequently, many of the smaller, less efficient sites have failed. Although
389:
Whether the user is able to continue accessing their data depends on a large number of factors, ranging from the location and quality of their internet connection, and the physical integrity of the provider's data center, to the financial stability of the storage provider (because, even if perfectly
187:
Many providers offer tiered storage levels, charging differently based on frequency of access and retrieval latency. There may be a different cost associated with access vs storage. For example, in a cold storage scenario, the price per GB stored over time can be very low, but it may take longer to
334:
as being evidence showing a criminal intent and venture. Examples cited included reliance upon advertising revenue and other activities showing the business was funded by (and heavily promoted) downloads and not storage, defendants' communications helping users who sought infringing material, and
174:
cost component as well. Usually these will be charged monthly or yearly. Some companies offer the service for free, relying on advertising revenue. Some hosting services do not place any limit on how much space the user's account can consume. Non-paying users' accounts may be deleted or suspended
496:
There is, however, no easily accessible public record of this having been tried in court as of May 2013 and an argument could be made that, similar to the opinion expressed by Attorney Rick G. Sanders of Aaron | Sanders PLLC in regards to the iTunes Match "Honeypot" discussion, that a warrant to
310:
higher regional court examined claims related to alleged infringing activity and reached the conclusion on appeal that "most people utilize RapidShare for legal use cases" and that to assume otherwise was equivalent to inviting "a general suspicion against shared hosting services and their users
237:
The sites make money through advertising or charging for premium services such as increased downloading capacity, removing any wait restrictions the site may have or prolonging how long uploaded files remain on the site. Premium services include facilities like unlimited downloading, no waiting,
118:
and sharing services allow users to create special folders on each of their computers or mobile devices, which are then synchronized across all devices. Files placed in this folder can be accessed through a website or mobile app and easily shared with others for viewing or collaboration.
183:
services, many users have started using their webmail service as an online drive. Some sites offer free unlimited file storage but have a limit on the file size. Some sites offer additional online storage capacity in exchange for new customer referrals.
1334:"MEGA has been designed around user-controlled end-to-end encryption. MEGA's end-to-end encryption (E2EE) paradigm enhances the overall security by providing 'privacy by design', unlike many of its competitors who only provide 'privacy by policy'" 416:
Consumer-grade, public file hosting and synchronization services are popular, but for business use, they create the concern that corporate information is exported to devices and cloud services that are not controlled by the organization.
989:
ruling: "entspricht einem Generalverdacht gegen Sharehoster-Dienste und ihre Nutzer, der so nicht zu rechtfertigen ist" ("corresponds to a general suspicion against shared hosting services and their users, which is not to justify
178:
Some services require a software download which makes files only available on computers which have that software installed, others allow users to retrieve files through any web browser. With the increased inbox space offered by
497:
search the cloud storage provider's servers would be hard to obtain without other, independent, evidence establishing probable cause for copyright infringement. Such legal restraint would obviously not apply to the
412:
state that they either encrypt data before it is uploaded or while it is stored. While encryption is generally regarded as best practice in cloud storage how the encryption is implemented is very important.
707: 302:
declared the site a "notorious illegal site", claiming that the site was "overwhelmingly used for the global exchange of illegal movies, music and other copyrighted works". But in the legal case
1145: 92:
Personal file storage services are designed for private individuals to store and access their files online. Users can upload their files and share them publicly or keep them password-protected.
1467: 624: 1436: 473:
derives the key from the file content itself and means an identical file encrypted on different computers result in identical encrypted files. This enables the cloud storage provider to
428:, which is distinct from simple "read", "write", and "read-write" permissions in that all existing data is immutable. Append-only support is especially important to mitigate the risk of 849: 335:
defendants' communications discussing their own evasion and infringement issues. As of 2014 the case has not yet been heard. A year later, Megaupload.com relaunched as
1092: 647: 1311: 150:
Many businesses use file hosting services as part of their backup and disaster recovery strategies. By storing copies of important files offsite in a secure
704: 1061: 903: 107:. However many remote file storage services are now aimed at allowing users to share and synchronize all types of files across all the devices they use. 1141: 1009: 386:, and may be expressed with questions of the kind: Will the user be able to continue accessing their data? Who else can access it? Who can change it? 1459: 1268: 616: 1119: 1428: 1282: 874: 425: 1506: 536: with: Deals with the questions: Who owns the data the user uploads? Will the act of uploading change the ownership?. You can help by 188:
access an item at a higher per GB retrieval cost. In some cases, users may have to commit to retrieval being much higher latency as well.
797: 567: 1228: 1402: 95:
Document-sharing services allow users to share and collaborate on document files. These services originally targeted files such as
845: 758: 946: 1034: 890: 724: 680: 347: 1205: 572: 1819: 562: 390:
fit from a technical point of view, if the provider financially goes out of business, then its services go offline too).
315: 87: 1242: 1084: 1499: 654: 577: 374:
services has prompted much discussion on security. Security, as it relates to cloud storage can be broken down into:
242:
to prevent automated downloading. Several programs aid in downloading files from these one-click hosts; examples are
1367: 1307: 296: 1057: 972: 911: 1492: 263: 999: 537: 1848: 1115: 1175: 506: 1341: 871: 782:"The Right not to Forget: Cloud Based Services Moratoriums in War Zones and Data Portability Rights" 1843: 219: 139: 587: 394: 490: 58: 793: 781: 130:
have made file hosting and sharing more accessible and popular for personal and business use.
49:
files that can be accessed over the internet after providing a username and password or other
1838: 1811: 470: 409: 383: 171: 70: 66: 62: 1515: 449: 398: 327: 115: 935:
Legal case: OLG Dusseldorf, Judgement of 22.03.2010, Az I-20 U 166/09 dated 22 March 2010.
820: 8: 1395: 904:"RIAA joins congressional caucus in unveiling first-ever list of notorious illegal sites" 421: 326:
concluded that Megaupload differed from other online file storage businesses, suggesting
1267:
Pont, J.; Abu Oun, O.; Brierley, C.; Arief, B.; Hernandez-Castro, J. (1 November 2019).
474: 464: 351: 212: 750: 481:
Some point out that there is a theoretical possibility that organizations such as the
393:
The question of who can access and, potentially, change, their data, ranges from what
354:
listed Putlocker as one of the "top 5 rogue cyberlocker services", alongside Wupload,
966: 789: 950: 1790: 1785: 1274: 1234: 1026: 502: 155: 728: 505:
who could potentially gain access to the encrypted files through various forms of
1579: 1197: 878: 711: 592: 208: 1278: 1654: 1604: 453: 336: 331: 319: 100: 50: 436:
policies in the event that the computer being backed-up becomes infected with
1832: 1765: 1544: 1539: 1226: 1013: 597: 498: 371: 42: 1460:"Is iTunes Match a honeypot for music pirates? A copyright lawyer weighs in" 1238: 307: 1705: 1690: 1624: 1619: 1574: 582: 269: 259: 228: 224: 127: 61:. Other related services include content-displaying hosting services (i.e. 1429:"Bitcasa: Infinite storage comes to your desktop, but so do big questions" 1058:"Yet Another Video Streaming Service Bites The Dust, Putlocker Shuts Down" 142:. This is especially common for companies with a major internet presence. 1750: 1745: 1674: 284: 243: 231: 200: 151: 104: 1484: 1363: 1266: 525: 1775: 1760: 1740: 1735: 1669: 1394:
Storer, Mark W.; Greenan, Kevin; Long, Darrell D. E.; Miller, Ethan L.
510: 437: 402: 323: 292: 870:
Nikiforakis N., Balduzzi M. Van Acker S., Joosen W. and Balzarotti D.
1795: 1700: 1659: 1649: 1644: 1639: 1634: 1609: 1599: 1594: 1589: 1584: 1569: 1534: 1529: 457: 429: 359: 355: 343: 272:
without consent of the copyright owner. In such cases one individual
247: 1227:
Kolodenker, E.; Koch, W.; Stringhini, G.; Egele, M. (2 April 2017).
138:
Content providers who encounter bandwidth congestion issues may use
1755: 1664: 1614: 1559: 1142:"Cloud Data Storage, Encryption and Data Protection Best Practices" 478:
file simply by encrypting it themselves and comparing the outputs.
277: 204: 167: 154:, they can quickly recover from data loss due to hardware failure, 123: 38: 821:"Hot Storage vs Cold Storage in 2023: Instant Access vs Archiving" 322:
and commenced criminal cases against its owners and others. Their
1720: 1710: 1695: 1629: 1564: 1554: 1549: 288: 239: 180: 1364:"SpiderOak - Zero Knowledge Privacy with Encrypted Cloud Backup" 846:"Cyberlockers Take Over File-Sharing Lead From BitTorrent Sites" 1770: 993: 433: 299: 295:, in 2010 the US government's congressional international anti- 273: 46: 1270:
A Roadmap for Improving the Impact of Anti-ransomware Research
1085:"MPAA wants more criminal cases brought against 'rogue' sites" 463:
Since secret key encryption results in unique files, it makes
223:
one-click hosting can be used for many purposes, this type of
140:
specialized services for distributing cached or static content
1780: 1730: 1725: 1715: 350:
for being a major piracy threat, and in 2012 Alfred Perry of
1389: 1387: 1385: 1167: 1333: 1088: 907: 486: 482: 199:, sometimes referred to as cyberlocker generally describes 54: 1382: 96: 460:
being entirely zero knowledge file storage and sharing.
440:
capable of deleting or encrypting the victim's backups.
276:
a file to a file hosting service, which others can then
238:
maximum download speed etc. Many such sites implement a
786:
Rights to Privacy and Data Protection in Armed Conflict
166:
Some online file storage services offer space on a per-
872:"Exposing the Lack of Privacy in File Hosting Services 211:(or from a remote location) onto the one-click host's 1168:"BorgBase - Secure hosting for your BorgBackup Repos" 931: 929: 648:"Cloud Storage: File Hosting and Synchronisation 2.0" 467:
impossible and therefore may use more storage space.
1308:"5 Ways To Securely Encrypt Your Files in the Cloud" 751:"Introduction to Backup and Disaster Recovery | IBM" 207:
users to easily upload one or more files from their
1393: 1113: 397:are in place in the provider's data center to what 41:hosting service specifically designed to host user 1230:PayBreak: Defense Against Cryptographic Ransomware 926: 705:How to transfer files from Dropbox to Google Drive 448:Secret key encryption is sometimes referred to as 424:for application keys. One important permission is 253: 110: 1830: 377: 268:File hosting services may be used as a means to 681:"How Dropbox Could Rule a Multi-Platform World" 145: 1500: 1356: 1300: 1107: 1457: 1426: 420:Some cloud storage providers offer granular 1031:, Crim. No. 1:12CR3 (E.D. Va. O'Grady, J.)" 568:Comparison of file synchronization software 318:seized and shut down the file hosting site 1815: 1507: 1493: 1134: 1514: 1000:Department of Justice indictment, on the 944: 280:. Legal assessments can be very diverse. 175:after a predefined period of inactivity. 53:. Typically, file hosting services allow 1082: 818: 81: 1273:. ResearchGate GmbH. pp. 137–154. 1033:. United States Department of Justice. 246:, FreeRapid, Mipony, Tucan Manager and 227:has, to a degree, come to compete with 16:Internet hosting service for user files 1831: 1055: 891:"Piracy Beyond P2P: One-Click Hosters" 779: 304:Atari Europe S.A.S.U. v. Rapidshare AG 1488: 1114:Jonathan Strickland (30 April 2008). 800:from the original on 22 December 2021 516: 348:Motion Picture Association of America 1288:from the original on 3 December 2019 1260: 1248:from the original on 22 October 2020 1220: 1208:from the original on 3 December 2019 1178:from the original on 3 December 2019 1064:from the original on 19 October 2016 1037:from the original on 27 October 2014 678: 573:Comparison of online backup services 520: 191: 1820:Comparison of file hosting services 1408:from the original on 22 August 2013 1370:from the original on 9 October 2014 1172:BorgBase - Simple Borg Repo Hosting 563:Comparison of file hosting services 316:United States Department of Justice 218:Most such services simply return a 88:Comparison of file hosting services 13: 1458:Brad McCarty (16 September 2011). 1427:Brad McCarty (23 September 2011). 1122:from the original on 29 April 2013 1029:United States v. Kim Dotcom, et al 819:Stockton, Ben (20 November 2020). 780:Cahane, Amir (15 September 2021). 617:"Share OneDrive files and folders" 578:Comparison of online music lockers 443: 161: 133: 14: 1860: 1470:from the original on 8 March 2016 1439:from the original on 22 July 2016 1344:from the original on 14 June 2019 1095:from the original on 9 March 2018 1056:Prabhu, Vijay (17 October 2016). 1027:"Release For Victim Notification 852:from the original on 17 July 2011 1814: 1807: 1806: 1083:Sandoval, Greg (31 March 2012). 761:from the original on 5 June 2023 645: 627:from the original on 2 June 2023 524: 384:confidentiality and availability 314:By contrast in January 2012 the 45:. These services allow users to 1451: 1420: 1326: 1314:from the original on 7 May 2013 1190: 1160: 1148:from the original on 2 May 2013 1076: 1049: 1019: 979: 945:Roettgers, Janko (3 May 2010). 938: 896: 883: 864: 399:technical steps have been taken 170:basis, and sometimes include a 1310:. Makeuseof.com. 26 May 2012. 838: 812: 773: 743: 717: 698: 672: 639: 609: 342:In 2016 the file hosting site 254:Use for copyright infringement 158:, or other unexpected events. 111:File sync and sharing services 1: 910:. 19 May 2010. Archived from 603: 378:Access and integrity security 264:Legal aspects of file sharing 1198:"Why Use Immutable Storage?" 949:. Gigaom.com. Archived from 893:, Retrieved: 5 January 2008. 714:. Retrieved 24 December 2014 679:Metz, Rachel (9 July 2013). 456:(previously Megaupload) and 283:For example, in the case of 146:Backup and disaster recovery 31:online file-storage provider 7: 1396:"Secure Data Deduplication" 1279:10.1007/978-3-030-35055-0_9 556: 382:Deals with the question of 365: 328:a number of design features 10: 1865: 971:: CS1 maint: postscript ( 947:"RapidShare Wins in Court" 401:, such as access control, 257: 122:Consumer products such as 85: 1804: 1683: 1522: 1116:"How Cloud Storage Works" 877:15 September 2011 at the 270:distribute or share files 710:12 November 2016 at the 395:physical access controls 69:), virtual storage, and 1239:10.1145/3052973.3053035 588:List of backup software 76: 491:copyright infringement 410:cloud storage services 346:has been noted by the 1516:File hosting services 1233:. ResearchGate GmbH. 1204:. 11 September 2018. 685:MIT Technology Review 503:oppressive government 471:Convergent encryption 291:file hosting service 86:Further information: 82:Personal file storage 57:, and in some cases, 27:cloud-storage service 1016:– see sections 7–14. 358:, Depositfiles, and 23:file-hosting service 1118:. How Stuff Works. 1002:Wall Street Journal 987:Atari v. RapidShare 953:on 26 February 2011 1849:Records management 1615:Microsoft OneDrive 1144:. Techtarget.com. 914:on 26 October 2017 889:Roettgers, Janko. 517:Ownership security 465:data deduplication 352:Paramount Pictures 1826: 1825: 1401:. Ssrc.ucsc.edu. 621:Microsoft Support 554: 553: 370:The emergence of 197:One-click hosting 192:One-click hosting 156:natural disasters 1856: 1818: 1817: 1810: 1809: 1791:Yahoo! Briefcase 1509: 1502: 1495: 1486: 1485: 1480: 1479: 1477: 1475: 1455: 1449: 1448: 1446: 1444: 1424: 1418: 1417: 1415: 1413: 1407: 1400: 1391: 1380: 1379: 1377: 1375: 1360: 1354: 1353: 1351: 1349: 1330: 1324: 1323: 1321: 1319: 1304: 1298: 1297: 1295: 1293: 1287: 1264: 1258: 1257: 1255: 1253: 1247: 1224: 1218: 1217: 1215: 1213: 1194: 1188: 1187: 1185: 1183: 1164: 1158: 1157: 1155: 1153: 1138: 1132: 1131: 1129: 1127: 1111: 1105: 1104: 1102: 1100: 1080: 1074: 1073: 1071: 1069: 1053: 1047: 1046: 1044: 1042: 1023: 1017: 1012:15 July 2012 at 1006: 997: 991: 983: 977: 976: 970: 962: 960: 958: 942: 936: 933: 924: 923: 921: 919: 900: 894: 887: 881: 868: 862: 861: 859: 857: 842: 836: 835: 833: 831: 816: 810: 809: 807: 805: 777: 771: 770: 768: 766: 747: 741: 740: 738: 736: 731:on 13 March 2007 727:. Archived from 721: 715: 702: 696: 695: 693: 691: 676: 670: 669: 667: 665: 659: 653:. Archived from 652: 646:Geel, Matthias. 643: 637: 636: 634: 632: 613: 549: 546: 528: 521: 306:in Germany, the 215:free of charge. 25:, also known as 1864: 1863: 1859: 1858: 1857: 1855: 1854: 1853: 1844:Social software 1829: 1828: 1827: 1822: 1800: 1679: 1580:IBM Connections 1518: 1513: 1483: 1473: 1471: 1456: 1452: 1442: 1440: 1425: 1421: 1411: 1409: 1405: 1398: 1392: 1383: 1373: 1371: 1362: 1361: 1357: 1347: 1345: 1332: 1331: 1327: 1317: 1315: 1306: 1305: 1301: 1291: 1289: 1285: 1265: 1261: 1251: 1249: 1245: 1225: 1221: 1211: 1209: 1196: 1195: 1191: 1181: 1179: 1166: 1165: 1161: 1151: 1149: 1140: 1139: 1135: 1125: 1123: 1112: 1108: 1098: 1096: 1081: 1077: 1067: 1065: 1054: 1050: 1040: 1038: 1025: 1024: 1020: 1004: 998: 994: 984: 980: 964: 963: 956: 954: 943: 939: 934: 927: 917: 915: 902: 901: 897: 888: 884: 879:Wayback Machine 869: 865: 855: 853: 844: 843: 839: 829: 827: 817: 813: 803: 801: 778: 774: 764: 762: 749: 748: 744: 734: 732: 723: 722: 718: 712:Wayback Machine 703: 699: 689: 687: 677: 673: 663: 661: 660:on 31 July 2017 657: 650: 644: 640: 630: 628: 615: 614: 610: 606: 593:Shared resource 559: 550: 544: 541: 534:needs expansion 519: 446: 444:Data encryption 380: 368: 332:operating model 266: 258:Main articles: 256: 194: 164: 162:Storage charges 148: 136: 134:Content caching 113: 103:documents, and 90: 84: 79: 17: 12: 11: 5: 1862: 1852: 1851: 1846: 1841: 1824: 1823: 1805: 1802: 1801: 1799: 1798: 1793: 1788: 1783: 1778: 1773: 1768: 1763: 1758: 1753: 1748: 1743: 1738: 1733: 1728: 1723: 1718: 1713: 1708: 1703: 1698: 1693: 1687: 1685: 1681: 1680: 1678: 1677: 1672: 1667: 1662: 1657: 1655:Tencent Weiyun 1652: 1647: 1642: 1637: 1632: 1627: 1622: 1617: 1612: 1607: 1602: 1597: 1592: 1587: 1582: 1577: 1572: 1567: 1562: 1557: 1552: 1547: 1542: 1537: 1532: 1526: 1524: 1520: 1519: 1512: 1511: 1504: 1497: 1489: 1482: 1481: 1464:TheNextWeb.com 1450: 1433:TheNextWeb.com 1419: 1381: 1355: 1325: 1299: 1259: 1219: 1189: 1159: 1133: 1106: 1075: 1048: 1018: 992: 978: 937: 925: 895: 882: 863: 837: 811: 772: 742: 725:"Macworld.com" 716: 697: 671: 638: 607: 605: 602: 601: 600: 595: 590: 585: 580: 575: 570: 565: 558: 555: 552: 551: 531: 529: 518: 515: 450:zero knowledge 445: 442: 379: 376: 367: 364: 320:Megaupload.com 255: 252: 193: 190: 163: 160: 147: 144: 135: 132: 112: 109: 101:word processor 83: 80: 78: 75: 51:authentication 15: 9: 6: 4: 3: 2: 1861: 1850: 1847: 1845: 1842: 1840: 1837: 1836: 1834: 1821: 1813: 1803: 1797: 1794: 1792: 1789: 1787: 1784: 1782: 1779: 1777: 1774: 1772: 1769: 1767: 1764: 1762: 1759: 1757: 1754: 1752: 1749: 1747: 1744: 1742: 1739: 1737: 1734: 1732: 1729: 1727: 1724: 1722: 1719: 1717: 1714: 1712: 1709: 1707: 1704: 1702: 1699: 1697: 1694: 1692: 1689: 1688: 1686: 1682: 1676: 1673: 1671: 1668: 1666: 1663: 1661: 1658: 1656: 1653: 1651: 1648: 1646: 1643: 1641: 1638: 1636: 1633: 1631: 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1593: 1591: 1588: 1586: 1583: 1581: 1578: 1576: 1573: 1571: 1568: 1566: 1563: 1561: 1558: 1556: 1553: 1551: 1548: 1546: 1543: 1541: 1540:Baidu Wangpan 1538: 1536: 1533: 1531: 1528: 1527: 1525: 1521: 1517: 1510: 1505: 1503: 1498: 1496: 1491: 1490: 1487: 1469: 1465: 1461: 1454: 1438: 1434: 1430: 1423: 1404: 1397: 1390: 1388: 1386: 1369: 1365: 1359: 1343: 1339: 1335: 1329: 1313: 1309: 1303: 1284: 1280: 1276: 1272: 1271: 1263: 1244: 1240: 1236: 1232: 1231: 1223: 1207: 1203: 1199: 1193: 1177: 1173: 1169: 1163: 1147: 1143: 1137: 1121: 1117: 1110: 1094: 1090: 1086: 1079: 1063: 1059: 1052: 1036: 1032: 1030: 1022: 1015: 1014:archive.today 1011: 1008: 1003: 996: 988: 982: 974: 968: 952: 948: 941: 932: 930: 913: 909: 905: 899: 892: 886: 880: 876: 873: 867: 851: 847: 841: 826: 822: 815: 799: 795: 791: 787: 783: 776: 760: 756: 752: 746: 730: 726: 720: 713: 709: 706: 701: 686: 682: 675: 656: 649: 642: 626: 622: 618: 612: 608: 599: 598:Cloud storage 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 560: 548: 539: 535: 532:This section 530: 527: 523: 522: 514: 512: 508: 504: 500: 499:secret police 494: 493:by the user. 492: 488: 484: 479: 476: 472: 468: 466: 461: 459: 455: 451: 441: 439: 435: 431: 427: 423: 418: 414: 411: 406: 404: 400: 396: 391: 387: 385: 375: 373: 372:cloud storage 363: 361: 357: 353: 349: 345: 340: 338: 333: 329: 325: 321: 317: 312: 309: 305: 301: 298: 294: 290: 286: 281: 279: 275: 271: 265: 261: 251: 249: 245: 241: 235: 233: 230: 226: 221: 216: 214: 210: 206: 202: 198: 189: 185: 182: 176: 173: 169: 159: 157: 153: 143: 141: 131: 129: 125: 120: 117: 108: 106: 102: 98: 93: 89: 74: 72: 71:remote backup 68: 64: 60: 56: 52: 48: 44: 40: 36: 32: 28: 24: 19: 1839:File hosting 1706:Firefox Send 1691:Amazon Drive 1625:Resilio Sync 1620:Proton Drive 1585:iCloud Drive 1575:Google Drive 1472:. Retrieved 1463: 1453: 1441:. Retrieved 1432: 1422: 1410:. Retrieved 1374:29 September 1372:. Retrieved 1358: 1346:. Retrieved 1338:MEGA Privacy 1337: 1328: 1316:. Retrieved 1302: 1290:. Retrieved 1269: 1262: 1250:. Retrieved 1229: 1222: 1210:. Retrieved 1201: 1192: 1180:. Retrieved 1171: 1162: 1150:. Retrieved 1136: 1124:. Retrieved 1109: 1097:. Retrieved 1078: 1066:. Retrieved 1060:. TechWorm. 1051: 1039:. Retrieved 1028: 1021: 1001: 995: 986: 981: 955:. Retrieved 951:the original 940: 916:. Retrieved 912:the original 898: 885: 866: 854:. Retrieved 840: 828:. Retrieved 824: 814: 802:. Retrieved 785: 775: 763:. Retrieved 754: 745: 733:. Retrieved 729:the original 719: 700: 688:. Retrieved 684: 674: 662:. Retrieved 655:the original 641: 629:. Retrieved 620: 611: 583:File sharing 545:January 2020 542: 538:adding to it 533: 495: 480: 475:de-duplicate 469: 462: 447: 419: 415: 407: 392: 388: 381: 369: 341: 313: 303: 282: 267: 260:File sharing 236: 225:file sharing 217: 201:web services 196: 195: 186: 177: 165: 149: 137: 128:Google Drive 121: 116:File syncing 114: 105:spreadsheets 94: 91: 34: 30: 26: 22: 20: 18: 1751:Peer Impact 1746:Norton Zone 1675:Yandex Disk 1099:10 November 1068:10 November 1041:10 November 755:www.ibm.com 426:append-only 244:JDownloader 232:filesharing 209:hard drives 203:that allow 152:data center 73:solutions. 55:HTTP access 35:cyberlocker 1833:Categories 1776:Ubuntu One 1761:RapidShare 1741:Megaupload 1736:Library.nu 1670:WeTransfer 1292:5 December 1252:5 December 1212:3 December 1182:3 December 957:16 January 918:16 January 825:Cloudwards 735:7 February 604:References 511:cybercrime 438:ransomware 403:encryption 324:indictment 308:DĂĽsseldorf 293:RapidShare 234:services. 59:FTP access 1796:ZumoDrive 1701:FileServe 1660:TitanFile 1650:Syncthing 1645:SugarSync 1640:SpiderOak 1635:ShareFile 1610:Nextcloud 1600:MediaFire 1595:Livedrive 1590:Jumpshare 1570:GameFront 1535:Backblaze 1530:Accellion 1007:s website 985:From the 830:14 August 509:or other 458:SpiderOak 430:data loss 360:MediaFire 356:FileServe 344:Putlocker 248:CryptLoad 172:bandwidth 1812:Category 1756:Pogoplug 1684:Inactive 1665:Tresorit 1560:DocuWare 1468:Archived 1437:Archived 1403:Archived 1368:Archived 1342:Archived 1312:Archived 1283:Archived 1243:Archived 1206:Archived 1176:Archived 1146:Archived 1120:Archived 1093:Archived 1062:Archived 1035:Archived 1010:Archived 967:cite web 875:Archived 850:Archived 798:Archived 759:Archived 708:Archived 690:5 August 664:5 August 631:22 April 625:Archived 557:See also 366:Security 278:download 205:internet 168:gigabyte 124:OneDrive 39:internet 37:, is an 1721:i-drive 1711:Hotfile 1696:Drop.io 1630:Seafile 1565:Dropbox 1555:CloudMe 1550:Cryptee 990:such"). 856:12 July 804:27 June 794:3944667 765:8 March 507:hacking 405:, etc. 330:of its 274:uploads 240:CAPTCHA 181:webmail 1786:Xdrive 1771:Twango 1766:SteekR 1523:Active 1348:5 June 1202:Wasabi 792:  501:of an 434:backup 300:caucus 297:piracy 289:German 213:server 47:upload 1781:Wuala 1731:LIBOX 1726:iDisk 1716:Humyo 1474:8 May 1443:8 May 1412:8 May 1406:(PDF) 1399:(PDF) 1318:8 May 1286:(PDF) 1246:(PDF) 1152:8 May 1126:8 May 1005:' 658:(PDF) 651:(PDF) 408:Many 285:Swiss 67:image 63:video 43:files 33:, or 1605:Mega 1476:2013 1445:2013 1414:2013 1376:2014 1350:2019 1320:2013 1294:2023 1254:2023 1214:2019 1184:2019 1154:2013 1128:2013 1101:2016 1089:CNET 1070:2016 1043:2014 973:link 959:2011 920:2011 908:RIAA 858:2011 832:2023 806:2023 790:SSRN 767:2023 737:2007 692:2014 666:2014 633:2022 487:MPAA 483:RIAA 454:MEGA 432:for 422:ACLs 337:Mega 262:and 126:and 97:PDFs 77:Uses 65:and 1545:Box 1275:doi 1235:doi 540:. 229:P2P 220:URL 1835:: 1466:. 1462:. 1435:. 1431:. 1384:^ 1366:. 1340:. 1336:. 1281:. 1241:. 1200:. 1174:. 1170:. 1091:. 1087:. 969:}} 965:{{ 928:^ 906:. 848:. 823:. 796:. 788:. 784:. 757:. 753:. 683:. 623:. 619:. 513:. 485:, 362:. 339:. 250:. 99:, 29:, 21:A 1508:e 1501:t 1494:v 1478:. 1447:. 1416:. 1378:. 1352:. 1322:. 1296:. 1277:: 1256:. 1237:: 1216:. 1186:. 1156:. 1130:. 1103:. 1072:. 1045:. 975:) 922:. 860:. 834:. 808:. 769:. 739:. 694:. 668:. 635:. 547:) 543:( 287:–

Index

internet
files
upload
authentication
HTTP access
FTP access
video
image
remote backup
Comparison of file hosting services
PDFs
word processor
spreadsheets
File syncing
OneDrive
Google Drive
specialized services for distributing cached or static content
data center
natural disasters
gigabyte
bandwidth
webmail
web services
internet
hard drives
server
URL
file sharing
P2P
filesharing

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑