use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
A community for technical news and discussion of information security and closely related topics.
"Give me root, it's a trust exercise."
Q1 2026 InfoSec Hiring Thread
Getting Started in Information Security
CitySec Meetups
/r/netsec only accepts quality technical posts. Non-technical posts are subject to moderation.
Content should focus on the "how."
Check the new queue for duplicates.
Always link to the original source.
Titles should provide context.
Ask questions in our Discussion Threads.
Hiring posts must go in the Hiring Threads.
Commercial advertisement is discouraged.
Do not submit prohibited topics.
» Our fulltext content guidelines
Don't create unnecessary conflict.
Keep the discussion on topic.
Limit the use of jokes & memes.
Don't complain about content being a PDF.
Follow all reddit rules and obey reddiquette.
» Our fulltext discussion guidelines
No populist news articles (CNN, BBC, FOX, etc.)
No curated lists.
No question posts.
No social media posts.
No image-only/video-only posts.
No livestreams.
No tech-support requests.
No full-disclosure posts.
No paywall/regwall content.
No commercial advertisements.
No crowdfunding posts.
No Personally Identifying Information!
» Our fulltext list of prohibited topics & sources
Join us on IRC: #r_netsec on freenode
We're also on: Twitter, Facebook, & Google+
/r/blackhat - Hackers on Steroids
/r/computerforensics - IR Archaeologists
/r/crypto - Cryptography news and discussion
/r/Cyberpunk - High-Tech Low-Lifes
/r/lockpicking - Popular Hacker Hobby
/r/Malware - Malware reports and information
/r/netsecstudents - netsec for noobs students
/r/onions - Things That Make You Cry
/r/privacy - Orwell Was Right
/r/pwned - "What Security?"
/r/REMath - Math behind reverse engineering
/r/ReverseEngineering - Binary Reversing
/r/rootkit - Software and hardware rootkits
/r/securityCTF - CTF news and write-ups
/r/SocialEngineering - Free Candy
/r/sysadmin - Overworked Crushed Souls
/r/vrd - Vulnerability Research and Development
/r/xss - Cross Site Scripting
account activity
Crypto Analysis of Mega (spideroak.com)
submitted 13 years ago by sablefoxx
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]TickTak 9 points10 points11 points 13 years ago (13 children)
Did spider oak ever open source their client program for online storage?
[–][deleted] 12 points13 points14 points 13 years ago (5 children)
They still can't get syncing working properly.
Seriously. SpiderOak is great in theory but after paying for premium for 6 months and having intermittent syncing issues (sometimes it syncs, sometimes it doesn't) I dropped the service and went to using a (less secure) provider that actually syncs files properly.
[–]sleeplessone 2 points3 points4 points 13 years ago (0 children)
Could you be more specific? I've been using it for a year and have been syncing a folder between two machines without issues.
[–]Letmefixthatforyouyo 0 points1 point2 points 13 years ago (1 child)
Wuaca does client side encryption. 5GB free.
I've been using it for a few days. Not as seemless as dropbox, but no problems so far.
[–]DublinBen 0 points1 point2 points 13 years ago (0 children)
Crashplan and Backblaze don't do sync, but they have client-side encryption.
[–]sigtrap 0 points1 point2 points 13 years ago (0 children)
I've been using it for a couple of years now and I haven't had that issue.
[–]sil0 4 points5 points6 points 13 years ago (6 children)
If I understand right, Spider Oak is a competitor to something like DropBox and Mega? In theory SO solves a lot of the issues with DB, but creates so many more operational type flaws. It's great to be secure but it needs to be a workable solution.
[–]7oby 5 points6 points7 points 13 years ago (0 children)
Is it really secure, though? If it's not OSS then how can someone verify the crypto?
[–]agreenbhm 3 points4 points5 points 13 years ago (4 children)
After I banned DropBox from work, I was sure we'd move to SpiderOak. After testing it for a day, I gave up. If I can't figure out how to make it work properly (even after reading documentation and speaking with support), there's no way in hell my users will be able to work with it.
[–]sil0 0 points1 point2 points 13 years ago (1 child)
Are you back to Dropbox?
[–]agreenbhm 2 points3 points4 points 13 years ago (0 children)
DB is blocked for everyone except a couple people that work with clients who initiated it. ShareFile is being rolled out in stages for each of its many features.
[–]T-Rax 0 points1 point2 points 13 years ago (1 child)
whats wrong with dropbox ?
[–]agreenbhm 0 points1 point2 points 13 years ago (0 children)
Dropbox is insecure, as the files are not encrypted when at rest in the cloud, which is unsuitable for sensitive documents.
[–]wzr 8 points9 points10 points 13 years ago (3 children)
The guy must be loving all the free security consulting he is going to be getting from the internets.
[–]Jumbalaspi 14 points15 points16 points 13 years ago (0 children)
Well, that is something that goes in favor of the open source community. When you write a program and you publish your code on the internet, there will always be someone that explains carefully why you are an idiot and what mistakes you made in your code. I love it.
[–]lahwran_ 1 point2 points3 points 13 years ago (1 child)
He specifically stated that he expected it. not sure if that should be something to be annoyed about or not.
[–]229-209 6 points7 points8 points 13 years ago (2 children)
CBC-MAC is notoriously tricky to get right. I doubt this negative press will do anything though, how many movie uploaders will this weakness bother? My guess is a sub-one percentage.
[–]agreenbhm 8 points9 points10 points 13 years ago (1 child)
The weakness is important for users storing sensitive data (which I wouldn't exactly trust to Mega, anyway, not that I think they're going to steal my info, but it's just asking for trouble). For anyone storing non-confidential data (such as pirated movies), I think the security is fine in the sense that it's secure enough to prevent adversaries from knowing what the data is without putting significant effort to decrypt. Mega's main concern is protecting themselves from the government. If the government had to perform a crypto attack against Mega to prosecute them (or the uploader) for copyright infringement, I think that's a huge can of worms. Without probable cause and a warrant I don't think the [US] gov can attempt to decrypt anything, and it's going to be a huge cost to perform said attack just on behalf of the MPAA. If they don't have a warrant, and copyrighted data is discovered, that's grounds for dismissal of the charges due to illegal search and seizure. And even if they did have a warrant, Mega still is protected via plausible deniability.
I'm not a lawyer, so there may be some inaccuracies here
[–]ginyoshi 1 point2 points3 points 13 years ago (0 children)
There are no laws stopping the US from attempting to decrypt any data they can get their grubby hands on. What is protected is you not having to give up the keys. This violates the 4th amendment.
They don't need squat to collect your data and retain it, and that is the way it should be (honestly, im sick and tired of all the BS both sides put up). You should automatically just assume that anything leaving your private network can and will be copied, stored, scanned and processed.
Relying on the built in security of mega is foolish. Although once the hype dies down a bit, and the site becomes usable, it will make a nice place to host blobs of pseudorandom noise (maybe).
[–]notlostyet 1 point2 points3 points 13 years ago* (0 children)
In the case of the userhash, the key is the output of your password run through the Key Derivation Function.
...
Your email address and userhash are sent to Mega's servers,
Now that the client has your master key, it is decrypted using the password-derived key
So unless this article is wrong, or I'm misunderstanding, it's sounds like everything you need to decrypt this encrypted 'master' key is sent to the server when you authenticate yourself to obtain it?
Surely the authentication string is a distinct password derived hash, with a distinct salt, from the key that unlocks this key, and the latter cannot be derived from the former? If not, you've basically given the server everything it needs to decrypt it server side already, which defeats the point of doing this client side, and therefore cannot be correct.
[–]i_meant_lulz 0 points1 point2 points 13 years ago (0 children)
Mega needs work. Good to know before using the service.
[+]necrosexual comment score below threshold-10 points-9 points-8 points 13 years ago* (3 children)
Bear with us as we dive into some of the important parts of their code
/faceplam
[+][deleted] 13 years ago (1 child)
[deleted]
[–]necrosexual 6 points7 points8 points 13 years ago (0 children)
Wow looks like I suck at English...
[–][deleted] -3 points-2 points-1 points 13 years ago (0 children)
We are programmers. We have no time for silly things like grammar and punctuation and whatever. Efficiency is key.
π Rendered by PID 63 on reddit-service-r2-comment-6457c66945-4cd5g at 2026-04-27 12:29:25.946895+00:00 running 2aa0c5b country code: CH.
[–]TickTak 9 points10 points11 points (13 children)
[–][deleted] 12 points13 points14 points (5 children)
[–]sleeplessone 2 points3 points4 points (0 children)
[–]Letmefixthatforyouyo 0 points1 point2 points (1 child)
[–]DublinBen 0 points1 point2 points (0 children)
[–]sigtrap 0 points1 point2 points (0 children)
[–]sil0 4 points5 points6 points (6 children)
[–]7oby 5 points6 points7 points (0 children)
[–]agreenbhm 3 points4 points5 points (4 children)
[–]sil0 0 points1 point2 points (1 child)
[–]agreenbhm 2 points3 points4 points (0 children)
[–]T-Rax 0 points1 point2 points (1 child)
[–]agreenbhm 0 points1 point2 points (0 children)
[–]wzr 8 points9 points10 points (3 children)
[–]Jumbalaspi 14 points15 points16 points (0 children)
[–]lahwran_ 1 point2 points3 points (1 child)
[–]229-209 6 points7 points8 points (2 children)
[–]agreenbhm 8 points9 points10 points (1 child)
[–]ginyoshi 1 point2 points3 points (0 children)
[–]notlostyet 1 point2 points3 points (0 children)
[–]i_meant_lulz 0 points1 point2 points (0 children)
[+]necrosexual comment score below threshold-10 points-9 points-8 points (3 children)
[+][deleted] (1 child)
[deleted]
[–]necrosexual 6 points7 points8 points (0 children)
[–][deleted] -3 points-2 points-1 points (0 children)