Nobody can deny the comfort of cloud file-storage providers like Dropbox or OneDrive. The one disadvantage is that cybercriminals, intelligence companies, or the internet hosting supplier itself can view your cloud-based recordsdata with out authorization. However there’s a safer various: encrypted cloud file-storage. Some name it end-to-end encryption (E2EE) — just like Sign and WhatsApp. Based on the advertising and marketing blurb, recordsdata are encrypted in your gadget and despatched to the cloud already in safe kind — the encryption key remaining in your possession and nobody else’s. Not even the supplier can sniff this data. However is that actually the case?
Swiss-cheese encryption
The Utilized Cryptography Group at ETH Zurich took aside the algorithms of 5 in style encrypted storage providers: Sync.com, pCloud, Icedrive, Seafile, and Tresorit. In every of them, the researchers discovered errors within the implementation of encryption permitting, to various levels, file manipulation, and even entry to fragments of unencrypted knowledge. Earlier, they’d found flaws in two different in style internet hosting providers — MEGA and Nextcloud.
In all circumstances, assaults are carried out from a malicious server. The state of affairs is as follows: the intruders both hack the encrypted internet hosting servers, or, by manipulating routers alongside the client-to-server path, pressure the sufferer’s laptop to hook up with one other server mimicking the real encrypted internet hosting server. If this difficult maneuver succeeds, the attackers can theoretically:
- Within the case of com, plant folders and recordsdata with incriminating data, and alter the file names and metadata of saved data. Additionally, the hacked server can ship new encryption keys to the shopper, then decrypt any recordsdata downloaded afterwards. Plus, the built-in share operate permits the malicious server to decrypt any file shared by the sufferer, because the decryption secret is contained within the hyperlink that’s despatched when the server is accessed.
- Within the case of pCloud, plant recordsdata and folders, arbitrarily transfer recordsdata and swap file names, delete file fragments, and decrypt recordsdata downloaded post-hack.
- Within the case of Seafile, pressure the shopper to make use of an older model of the protocol, making it simpler to bruteforce passwords, swap or delete file fragments, plant recordsdata and folders, and modify file metadata.
- Within the case of Icedrive, plant recordsdata consisting of fragments of different recordsdata already uploaded to the cloud, change the identify and site of saved recordsdata, and reorder file fragments.
- Within the case of Tresorit, manipulate the metadata of saved recordsdata— together with authorship.
- Within the case of Nextcloud, manipulate encryption keys — permitting decryption of downloaded recordsdata.
- Within the case of MEGA, restore encryption keys and thus decrypt all recordsdata. It’s additionally potential to plant incriminating recordsdata.
The malicious server in every case is a hard-to-implement however not blue-sky part of the assault. In gentle of the cyberattacks on Microsoft and Twilio, the opportunity of compromising a significant participant is actual. And naturally, E2EE by definition must be proof against malicious server-side actions.
With out going into technical particulars, we notice that the builders of all of the providers appear to have carried out bona fide E2EE and used acknowledged, sturdy algorithms like AES and RSA. However file encryption creates lots of technical difficulties in terms of doc collaboration and co-authoring. The duties required to beat these difficulties and consider all potential assaults involving modified encryption keys stay unsolved, however Tresorit has carried out a much better job than anybody else.
The researchers level out that the builders of the varied providers made very comparable errors independently of one another. Which means the implementation of encrypted cloud storage is fraught with non-trivial cryptographic nuances. What’s wanted is a well-developed protocol completely examined by the cryptographic group — reminiscent of TLS for web sites or the Sign Protocol for fast messengers.
Pricey fixes
The largest drawback with fixing the recognized bugs is that not solely do the purposes and server software program want updating, but additionally, in lots of circumstances, user-saved recordsdata want re-encrypting. Not each internet hosting supplier can afford these enormous computational outlays. What’s extra, re-encryption is barely potential in cooperation with every consumer — not unilaterally. Which might be why fixes are gradual in coming:
- com responded to the researchers after six months, and solely after the looks of press studies. Having lastly woken up, they introduced a repair for the issue of key leakage when sharing hyperlinks, and mentioned they’d to patch the opposite flaws as effectively — however with out giving a time-frame.
- Tresorit promised to repair the difficulty in 2025 (however the issue is much less acute for them).
- Seafile fastened the difficulty of protocol model downgrade with out commenting on the opposite flaws.
- Icedrive determined to not deal with the recognized points.
- pCloud didn’t reply to the researchers till the looks of press studies, then introduced that the assaults are theoretical and don’t require instant motion.
- Nextcloud fastened the difficulty and majorly reworked the general method to E2EE in model 3.12. The up to date encryption scheme has but to be researched.
- MEGA considerably lowered the probability of an assault by introducing client-side checks.
What customers must do
Though the problems recognized by the Utilized Cryptography Group can’t be referred to as purely theoretical, they don’t symbolize a mass risk readily exploitable by cybercriminals. Due to this fact, hasty motion isn’t required; slightly — a sober evaluation of your scenario is required:
- How delicate is the information in your storage, and the way tempting is it to outsiders?
- How a lot knowledge do you retailer within the encrypted service, and is it straightforward to maneuver to a different?
- How vital are the collaboration and file-sharing options?
If collaboration isn’t vital, whereas the information saved is crucial, the most suitable choice is to change to native file encryption. You are able to do this in quite a lot of methods — for instance, by storing knowledge in an encrypted container file or an archive with a robust password. If you’ll want to switch knowledge to a different gadget, you’ll be able to add an already encrypted archive to the cloud internet hosting service.
If you wish to mix collaboration and comfort with correct safety ensures, and the quantity of saved knowledge isn’t that nice, it’s value shifting the information to one of many providers that higher withstood ETH Zurich’s testing. Meaning Tresorit in the beginning, however don’t low cost MEGA and Nextcloud.
If none of those options suits the invoice, you’ll be able to go for different encrypted internet hosting providers, however with extra precautions: keep away from storing extremely delicate knowledge, promptly replace shopper purposes, often examine your cloud drives, and delete outdated or extraneous data.
In any case, keep in mind that the most probably assault in your knowledge will take the form of an infostealer merely compromising your laptop or smartphone. Due to this fact, encrypted internet hosting should go hand in hand with full anti-malware safety for all smartphones and computer systems.


