The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© 2021 AFPMicrosoft warns thousands of cloud customers of data vulnerability
SAN FRANCISCO©2024 GPlusMedia Inc.
The requested article has expired, and is no longer available. Any related articles, and user comments are shown below.
© 2021 AFP
22 Comments
Login to comment
GBR48
Security and accessibility needs to be proportionate to your needs. If you only have cat photos, you don't need to start learning Linux, and you are unlikely to be hacked by elite Russian cyber units. Simply having a couple of backups is actually more important. You do have backups, don't you?
Network Addressed Storage (NAS) devices have been around for a while. It can help to get one with two drives, mirroring your data as a backup (a very simple RAID array). Even then, your backup is a bit close to your main drive. Ideally you need two backup drives in different places. They can all be local to you, but do keep one in a water/fire/theft/nuke-proof box. Or surround it with old Nokia phones. End to end encryption is always good.
Amber X looks to have nice, punter-friendly software. Maybe too nice. Making it easy to share music and video might get you (or them) into bother.
Ultimately, the problem is that your NAS drive has to be on and connected somewhere for you to access it, via your connection. Power goes down. ISP connections go down. Even infrastructure can go down. And almost anything can be blocked.
Keeping a copy of the stuff you need with you, encrypted, on a shock-proof external hard drive or memory card, may remain a good idea should you be travelling.
theFu
BTW, a raspberry pi v3 with 1 external USB "desktop" HDD can be used for this. Say $50 for the HDD and $40 for the Pi.
Domain registration is less than $10/yr (not strictly required) and your home router can almost certainly forward a high tcp port to the Pi to provide ssh, scp, sftp, rsync, sshfs and x2go remote access. Many "dns forwarder" services are free - check out no-ip and many routers will have a page to enter the dns-forwarder service and so any IP changes cause an update.
For debian-based systems, to install and initially configure the main services,
sudo apt install ssh fail2ban rsync sshfs
ssh-key creation happens on the clients, so it is different. For Unix-based clients, use these 2 commands:
Step 1: Run on the client as the normal user:
$ ssh-keygen -t ed25519
Step 2: Run from the client to the server:
$ ssh-copy-id -i ~/.ssh/id_ed25519.pub username@remote
From that point on, ssh-based connections of any sort will be key authenticated. This is the only time that I know where security is both massively improved AND easier to use.
theFu
I've had access to my systems remotely for decades over ssh/sftp/sshfs or using a VPN (the server runs on my systems at home). Authentication uses keys, never passwords.
Be very careful using "cloud" storage inside your that can be accessed from the outside if you don't know what a registrar and dns and vpn are. If you don't setup these things yourself, then someone else has access.
All those remote desktop things that are really easy to use 99% of the time are a security failure waiting to be cracked. LogMeIn or RDP or VNC are all terrible for security.
"Security" isn't a check box to toggle on or off. Security is only possible using multiple layers of blocks, careful choices about authentication and preventing 99.999999% of the world from having any access at all. If only 10 devices should be able to access your home storage, then don't allow any other devices to even see it.
Ah_so
Don't store anything to the cloud that you want to keep confidential. Hackers are more than welcome to look at photos of my dog!
Ah_so
It doesn't seem to be be a cloud as such, just the next logical step to the external hard drive that we've been using for years. However, it is a good idea.
Robert Cikki
Many commenters in the discussion here seem to have absolutely no or superficial IT knowledge and have no idea what the topic is about. And it is not about Winblows vs Linux/Mac.
ShinkansenCaboose
I use Apple cloud storage for pictures. Handy and safe.
Strangerland
This Amber X doesn't look to be true "cloud" storage, which is when applications are disbursed over multiple servers, making it quickly accessible from various locations in the world rather than from a centralized location. However, "cloud" is often used to refer to something accessible from the internet. Amber X looks to be a remotely accessible network storage. I like the idea for the home user.
bass4funk
I use Amber X
bass4funk
Got my own personal cloud, I don't trust these big tech companies and I especially don't trust the government.
Sven Asai
Memorize your data or use pen and paper and wear it near your body. Everything else is less safe and in fact like a publicly open book or diary. lol
Peter14
theFu
Correct.
I warned my IT colleges over a decade ago when cloud computing was in it's infancy that it would never be secure and always giving your data to unknown or even known entities gives short term savings for lack control and of long term security.
Leave the cloud to free and universal data only. Nobody takes security of your data as serious as you do. And if you dont take it serious then your destined to be hacked or lose it in the cloud.
Azzprin
.
Possibly the vulnerability been in it since it was launched.
.
.
Recently ! like every few months a security issue comes out
.
.
Why does MS not simplify windows and reduce the number of holes it still has to be exposed.
.
.
Best way is to use something other than windows.
GBR48
Relax. It was just to allow Apple to check it.
Personally, I think you should never let your data leave your own systems. But if you do use cloud storage, encrypt everything, and do the encryption yourself before it leaves your kit.
Paul
LOL!!! Tell us something new!!! Cloud storage has never been safe and never will be. One got to protect files yourself by encrypting everything with PGP or something similar before uploading.
theFu
Live by the cloud, die by the cloud. Nothing can change that.
Beware that cloudy services are just running your code on someone else's computers, connected to someone else's storage at the end of someone else's network.
There are things that are perfect for cloudy deployments. Anything you want to share, for free, with the world belongs on a cloudy service. Everything else ... not so much.
Sensitive data should never be placed in any cloudy DB.