Risk

5/16/2011
02:06 PM
50%
50%

Dropbox Accused Of Misleading Customers On Security

FTC complaint charges that the file-sharing service hasn't told the truth about the security it applies to stored files, as well as who can access or view those files.

A complaint was filed with the Federal Trade Commission last week alleging that the popular Dropbox file-sharing service has been misleading users about the security and privacy of their files. Dropbox offers cross-platform file synchronization and online backup. According to the company, over 25 million people have registered to use Dropbox.

At issue is Dropbox's description of its service. Previously, the company stated in the "How Secure is Dropbox" page in its "Help Center" that "all files stored on Dropbox servers are encrypted (AES-256) and are inaccessible without your account password."

But the reality seems to be more complicated. In particular, Dropbox--unlike some of its competitors, such as Spideroak and Tarsnap--uses file deduplication when files are first uploaded. As a result, when a user uploads a file, the Dropbox site first studies the file to see if it's been uploaded by a different user. If so, Dropbox just links to the previously uploaded file.

But security and privacy researcher Christopher Soghoian, a graduate fellow at the Center for Applied Cybersecurity Research who's completing his PhD at the School of Informatics and Computing at Indiana University, said in a blog post--prefiguring his FTC complaint, noted above--that file deduplication typically results in poorer security. "While the decision to deduplicate data has probably saved the company quite a bit of storage space and bandwidth, it has significant flaws."

For starters, deduplication can make it easy for outsiders to know what's already on Dropbox's servers, since the website studies a file to see if it's seen it before. "While this doesn't tell you which other users have uploaded this file, presumably Dropbox can figure it out. I doubt they'd do it if asked by a random user, but when presented with a court order, they could be forced to," he said. "What this means, is that from the comfort of their desks, law enforcement agencies or copyright trolls can upload contraband files to Dropbox, watch the amount of bandwidth consumed, and then obtain a court order if the amount of data transferred is smaller than the size of the file."

Soghoian also questioned Dropbox's use of a single encryption key for all user data the company stores. First, there's the risk it creates that a malicious insider could inappropriately access any user's data. In addition, he said, "Dropbox has exposed its users to unnecessary risk of data theft by hackers who, if they break into the company's servers, may be able to steal users' data and the keys necessary for decryption." This has happened in several recent, high-profile attacks, for example against RSA and Comodo.

Finally, Dropbox's website had said that "Dropbox employees aren't able to access user files, and when troubleshooting an account they only have access to file metadata (filenames, file sizes, etc., not the file contents)." In April, however, in response to criticism of Dropbox's website--from Soghoian, among others--Dropbox altered its description. Instead of saying that employees can't access data, the new description says "we have strict access controls that prohibit employee access to user data."

In response to Soghoian's initial complaints, Dropbox's founders, CEO Drew Houston and CTO Arash Ferdowsi, on April 21 released a statement on the Dropbox website. "Like most major online services, we have a small number of employees who must be able to access user data when legally required to do so," they said. "But that's the exception, not the rule. We have strict policy and technical access controls that prohibit employee access except in these rare circumstances. In addition, we employ a number of physical and electronic security measures to protect user information from unauthorized access."

In response to the FTC complaint Soghoian then filed, a Dropbox spokesperson, Julie Supan, said on Monday in an emailed statement: “We believe this complaint is without merit, and raises issues that were addressed in our blog post on April 21."

Will Dropbox face a fallout with its customers? "I deleted my Dropbox account. It turns out that they lied and don't actually encrypt your files and will hand them over to anyone who asks,' said Jon Callis, the co-founder and CTO of PGP, via tweet. But Callis is arguably a security outlier, given that he understands the intricacies of encryption and deduplication.

Other users, however, have also been speaking up. Ewan Leith, a system and data migration specialist, accused Dropbox of having made "a straight-forward lie" in changing its terms of service. "Dropbox employees are able to access user files, but you have policies and technical solutions in place to control their access. It's a fundamental distinction."

Meanwhile, Soghoian, in his complaint to the FTC, urged Dropbox to alter its approach to data security by foregoing data deduplication and assigning each user their own strong encryption key. "Other online backup services have done it for some time. This is the only real way that data can be secure in the cloud," he said.

In the new, all-digital issue of InformationWeek: Our 2011 Strategic Security Survey shows increased executive interest in security. Here's what you should do next. Download it now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
3 Ways to Retain Security Operations Staff
Oliver Rochford, Vice President of Security Evangelism at DFLabs,  11/20/2017
A Call for Greater Regulation of Digital Currencies
Kelly Sheridan, Associate Editor, Dark Reading,  11/21/2017
New OWASP Top 10 List Includes Three New Web Vulns
Jai Vijayan, Freelance writer,  11/21/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.