<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; Mega.co.nz</title>
	<atom:link href="https://torrentfreak.com/tag/mega-co-nz/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Mega Goes Legal, Issues Ultimatum Over Cyberlocker Report</title>
		<link>https://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/</link>
		<comments>https://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/#comments</comments>
		<pubDate>Thu, 25 Sep 2014 09:55:18 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Mega.co.nz]]></category>
		<category><![CDATA[NetNames]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94386</guid>
		<description><![CDATA[Last week NetNames produced a report on "shadowy" file-hosting sites which surprisingly included Mega.co.nz. The file-hosting company responded by threatening "further action" unless it was removed from the "defamatory" report. Now, as promised, the New Zealand-based company is taking things to the next level. <p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/profit.png" width="222" height="175" class="alignright">Last week the Digital Citizens Alliance and NetNames released a new report with the aim of shining light on the business models of “shadowy” file-storage sites.</p>
<p>While listing some domains that may well live up to that less-than-flattering billing, the authors of <em>Behind The Cyberlocker Door: A Report How Shadowy Cyberlockers Use Credit Card Companies to Make Millions</em>, also decided to include New Zealand-based Mega.</p>
<p>Mega was founded by Kim Dotcom but the site bears little resemblance to his now defunct Megaupload. Perhaps most importantly, Mega was the most-scrutinized file-hosting startup ever, so every single detail simply had to be squeaky clean. As a result the site took extensive legal advice to ensure that it complies with every single facet of the law.</p>
<p>Nevertheless, NetNames took the decision to put Mega in its report anyway, bundling the site in with what are described as some of the market&#8217;s most dubious players. This was not received well by Mega CEO Graham Gaylard. In a <a href="http://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/">TorrentFreak article</a> he demanded a full apology from NetNames and Digital Citizens Alliance and for his company to be withdrawn from the report. Failure to do so would result in &#8220;further action&#8221;, he said.</p>
<p>TF asked NetNames&#8217; David Price whether his company stood by its allegations. The response suggested that it did and no apology was forthcoming. It&#8217;s been a week since that ultimatum and as promised Mega is now making good on its threats.</p>
<p>&#8220;Mega&#8217;s legal counsel has written to NetNames, Digital Citizens Alliance and The Internet Technology &#038; Innovation Foundation (ITIF) stating that the report is clearly defamatory,&#8221; Mega CEO Graham Gaylard told TorrentFreak this morning.</p>
<p>Given NetNames&#8217; and Digital Citizens Alliance failure to respond, it comes as little surprise that Mega&#8217;s formalized demands now go beyond an apology and retraction. </p>
<p>Firstly, Mega&#8217;s legal team are now demanding the removal of the report, and all references to it, from all channels under the respondents&#8217; control. They also demand that further circulation of the report must be discontinued and no additional references to it should be made in public.</p>
<p>That&#8217;s a tough one. NetNames&#8217; effort is currently the most-circulated report in the &#8216;piracy&#8217; space and TorrentFreak is also informed that the paper is set to become the supporting documentation to Hollywood and the labels&#8217; follow-the-money anti-piracy drive.</p>
<p>Mega are also demanding a list of everyone who has had a copy of the report made available to them along with details of all locations where the report has been published. Again, that will be an interesting one to see Mega&#8217;s targets fulfill.</p>
<p>Finally, Mega is demanding a full public apology &#8220;to its satisfaction&#8221; to be published on the homepages of the respondents&#8217; websites. What form that could take without discrediting the rest of the report is probably up for negotiation, but having Mega in there at all was bound to be a controversial and potentially damaging move.</p>
<p>Mega has given the companies seven days to comply with the above requests. No official line has been provided as to what will happen if Mega is met with a refusal, but it seems that the company is serious about protecting its reputation and will do whatever it takes to do that.</p>
<p>It&#8217;s perhaps of note that to our knowledge none of the other sites listed in the report have come out publicly to protest their inclusion in it. That&#8217;s not to say that some weren&#8217;t wrongfully included of course, but when a company like Mega stands up in order to protect its brand that should set off alarm bells.</p>
<p>Do &#8216;pirate&#8217; sites with &#8220;shadowy&#8221; business models ever bother to publicly defend their reputations unless they&#8217;re the ones being hauled into court? </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/mega-goes-legal-issues-ultimatum-over-cyberlocker-report-140925/feed/</wfw:commentRss>
		<slash:comments>38</slash:comments>
		</item>
		<item>
		<title>Mega Demands Apology Over &#8220;Defamatory&#8221; Cyberlocker Report</title>
		<link>https://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/</link>
		<comments>https://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/#comments</comments>
		<pubDate>Fri, 19 Sep 2014 16:24:42 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[afeat]]></category>
		<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Digital Citizens Alliance]]></category>
		<category><![CDATA[Mega.co.nz]]></category>
		<category><![CDATA[NetNames]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=94176</guid>
		<description><![CDATA[A new report which brands Mega.co.nz a "shadowy cyberlocker" has drawn a fierce response from the cloud storage site. CEO Graham Gaylard informs TorrentFreak that should the Digital Citizens Alliance refuse to remove Mega from its entire report and issue a public apology, further action will be taken.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/profit.png" width="222" height="175" class="alignright">Yesterday the Digital Citizens Alliance released a new report that looks into the business models of &#8220;shadowy&#8221; file-storage sites.</p>
<p>Titled “Behind The Cyberlocker Door: A Report How Shadowy Cyberlockers Use Credit Card Companies to Make Millions,” the report attempts to detail the activities of some of the world&#8217;s most-visited hosting sites.</p>
<p>While it&#8217;s certainly an <a href="http://torrentfreak.com/report-brands-dotcoms-mega-a-piracy-haven-140918/">interesting read</a>, the NetNames study provides a few surprises, not least the decision to include New Zealand-based cloud storage site Mega.co.nz. There can be no doubt that there are domains of dubious standing detailed in the report, but the inclusion of Mega stands out as especially odd.</p>
<p>Mega was without doubt the most-scrutinized file-hosting startup in history and as a result has had to comply fully with every detail of the law. And, unlike some of the other sites listed in the report, Mega isn&#8217;t hiding away behind shell companies and other obfuscation methods. It also complies fully with all takedown requests, to the point that it even <a href="http://torrentfreak.com/record-labels-take-down-kim-dotcoms-official-album-from-mega-140903/">took down its founder&#8217;s music</a>, albeit following an erroneous request.</p>
<p>With these thoughts in mind, TorrentFreak alerted Mega to the report and asked how its inclusion amid the terminology used has been received at the company.</p>
<p><strong>Grossly untrue and highly defamatory</strong></p>
<p><a href="/images/mega4.png"><img src="http://torrentfreak.com/images/mega4.png" alt="mega" width="240" height="85" class="alignright size-full wp-image-87644"></a>&#8220;We consider the report grossly untrue and highly defamatory of Mega,&#8221; says Mega CEO Graham Gaylard.</p>
<p>&#8220;Mega is a privacy company that provides end-to-end encrypted cloud storage controlled by the customer. Mega totally refutes that it is a cyberlocker business as that term is defined and discussed in the report prepared by NetNames for the Digital Citizens Alliance.&#8221;</p>
<p>Gaylard also strongly refutes the implication in the report that as a &#8220;cyberlocker&#8221;, Mega is engaged in activities often associated with such sites.</p>
<p>&#8220;Mega is not a haven for piracy, does not distribute malware, and definitely does not engage in illegal activities,&#8221; Gaylard says. &#8220;Mega is running a legitimate business alongside other cloud storage providers in a highly competitive market.&#8221;</p>
<p>The Mega CEO told us that one of the perplexing things about the report is that none of the criteria set out by the report for &#8220;shadowy&#8221; sites is satisfied by Mega, yet the decision was still taken to include it.</p>
<p><strong>Infringing content and best practices</strong></p>
<p>One of the key issues is, of course, the existence of infringing content. All user-uploaded sites suffer from that problem, from YouTube to Facebook to Mega and thousands of sites in between. But, as Gaylard points out, it&#8217;s the way those sites handle the issue that counts.</p>
<p>&#8220;We are vigorous in complying with best practice legal take-down policies and do so very quickly. The reality though is that we receive a very low number of take-down requests because our aim is to have people use our services for privacy and security, not for sharing infringing content,&#8221; he explains.</p>
<p>&#8220;Mega acts very quickly to process any take-down requests in accordance with its Terms of Service and consistent with the requirements of the USA Digital Millennium Copyright Act (DMCA) process, the European Union Directive 2000/31/EC and New Zealand’s Copyright Act process. Mega operates with a very low rate of take-down requests; less than 0.1% of all files Mega stores.&#8221;</p>
<p><strong>Affiliate schemes that encourage piracy</strong></p>
<p>One of the other &#8220;rogue site&#8221; characteristics as outlined in the report is the existence of affiliate schemes designed to incentivize the uploading and sharing of infringing content. In respect of Mega, Gaylard rejects that assertion entirely.</p>
<p>&#8220;Mega&#8217;s <a href="https://mega.co.nz/#affiliates">affiliate program</a> does not reward uploaders. There is no revenue sharing or credit for downloads or Pro purchases made by downloaders. The affiliate code cannot be embedded in a download link. It is designed to reward genuine referrers and the developers of apps who make our cloud storage platform more attractive,&#8221; he notes.</p>
<p><strong>The PayPal factor</strong></p>
<p><img src="http://torrentfreak.com/images/paypal.png" width="200" height="118" class="alignright">As detailed in many earlier reports (<a href="https://torrentfreak.com/paypal-bans-major-file-hosting-services-over-piracy-concerns-120710/">1</a>,<a href="https://torrentfreak.com/paypal-bans-usenet-providers-over-piracy-concerns-121121/">2</a>,<a href="https://torrentfreak.com/paypal-demands-invites-to-private-bittorrent-trackers-130108/">3</a>), over the past few years PayPal has worked hard to seriously cut down on the business it conducts with companies in the file-sharing space.</p>
<p>Companies, Mega included, now have to obtain pre-approval from the payment processor in order to use its services. The suggestion in the report is that large &#8220;shadowy&#8221; sites aren&#8217;t able to use PayPal due to its strict acceptance criteria. Mega, however, has a good relationship with PayPal.</p>
<p>&#8220;Mega has been accepted by PayPal because we were able to show that we are a legitimate cloud storage site. Mega has a productive and respected relationship with PayPal, demonstrating the validity of Mega’s business,&#8221; Gaylard says.</p>
<p><strong>Public apology and retraction &#8211; or else</strong></p>
<p>Gaylard says that these are just some of the points that Mega finds unacceptable in the report. The CEO adds that at no point was the company contacted by NetNames or Digital Citizens Alliance for its input.</p>
<p>&#8220;It is unacceptable and disappointing that supposedly reputable organizations such as Digital Citizens and NetNames should see fit to attack Mega when it provides the user end to end encryption, security and privacy. They should be promoting efforts to make the Internet a safer and more trusted place. Protecting people&#8217;s privacy. That is Mega’s mission,&#8221; Gaylard says.</p>
<p>&#8220;We are requesting that Digital Citizens Alliance withdraw Mega from that report entirely and issue a public apology.  If they do not then we will take further action,” he concludes.</p>
<p>TorrentFreak asked NetNames to comment on Mega&#8217;s displeasure and asked the company if it stands by its assertion that Mega is a &#8220;shadowy&#8221; cyberlocker. We received a response (although not directly to our questions) from David Price, NetNames&#8217; head of piracy analysis.</p>
<p>&#8220;The NetNames report into cyberlocker operation is based on information taken from the websites of the thirty cyberlockers used for the research and our own investigation of this area, based on more than a decade of experience producing respected analysis exploring digital piracy and online distribution,&#8221; Price said.</p>
<p>That doesn&#8217;t sound like a retraction or an apology, so this developing dispute may have a way to go. </p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/mega-demands-apology-over-defamatory-cyberlocker-report-140919/feed/</wfw:commentRss>
		<slash:comments>40</slash:comments>
		</item>
		<item>
		<title>New Browser Tool Claims to Reveal MEGA Users&#8217; Master Key</title>
		<link>https://torrentfreak.com/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/</link>
		<comments>https://torrentfreak.com/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/#comments</comments>
		<pubDate>Tue, 03 Sep 2013 09:08:01 +0000</pubDate>
		<dc:creator><![CDATA[Andy]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[Mega]]></category>
		<category><![CDATA[Mega.co.nz]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=76541</guid>
		<description><![CDATA[A brand new piece of software released in the past few hours claims to reveal MEGA users' master keys. The creator of the tool, an easily installed browser bookmarklet called MEGApwn, says that armed with the software anyone with access to a Mega user's computer can access their keys. However, even more controversially the New Zealand based software developer adds that Mega is able to gain access to a user's files.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><a href="http://torrentfreak.com/images/megalogo.jpg"><img class="alignright size-full wp-image-63627" alt="megalogo" src="http://torrentfreak.com/images/megalogo.jpg" width="170" height="141"></a>Kim Dotcom&#8217;s Mega.co.nz launched as the &#8216;Privacy Company&#8217; with a special emphasis on the security of its users&#8217; files. The company says that due to encryption, no one can access a user&#8217;s files hosted on Mega unless the user gives his permission.</p>
<p>In the wake of the NSA scandal the usefulness of encryption has really come to the forefront and MEGA is now placed to release encrypted messaging and email services utilizing similar technology. However, the company&#8217;s claims also mean that it becomes a target for those seeking to point out potential weaknesses in its system.</p>
<p>A few hours ago a software developer called Michael Koziarski released a new tool which he claims highlights a fundamental issue with the encryption mechanism implemented by Mega.</p>
<p>The software, known as <a href="http://nzkoz.github.io/MegaPWN/">MEGApwn</a>, is a Javascript bookmarklet that runs in a web browser. Once a user is logged into MEGA it claims to reveal that user&#8217;s MEGA master key. Koziarski says that this proves that the master key itself is not encrypted and that anyone with access to a MEGA user&#8217;s computer can access it.</p>
<p>However, this is not the most controversial claim. Koziarski says that MEGA itself is able to grab a key and use it to access a user&#8217;s files.</p>
<p>&#8220;Your web browser trusts whatever it receives from MEGA, which means they can grab your master key whenever you visit their site and then use it to decrypt and read your files. You&#8217;d never know,&#8221; Koziarski explains.</p>
<p><center><img alt="megaPWN" src="http://torrentfreak.com/images/megaPWN.jpg"></center>The dev, who maintains several open source projects, says that if MEGA was issued with a subpoena it could be forced to obtain a user&#8217;s master key and be forbidden by law to reveal anything about it. He also claims that ANY installed browser extension could also access a user&#8217;s master key.</p>
<p>The revelations provoked an exchange with MEGA programmer <a href="https://twitter.com/bramosnl/status/374669888691793920">Bram Van der Kolk</a>, who questioned how MEGA would stop anyone gaining access to a user&#8217;s computer.</p>
<p>&#8220;You seriously want MEGA to protect users against this?&#8221; he said.</p>
<p>&#8220;No, I want users to understand just how easily you could read all their files if you wanted to,&#8221; Koziarski responded.</p>
<p>&#8220;You mean how easily the user himself can read his own files. How exactly can an external attacker take advantage of this?&#8221; der Kolk questioned.</p>
<p>&#8220;So you agree MEGA is only secure against external attackers, that you can read my files if you wanted to?&#8221; Koziarski fired back.</p>
<p>&#8220;Are you seriously suggesting that we will serve trojaned JavaScript? Install one of our browser extensions and turn off auto-updates,&#8221; der Kolk countered.</p>
<p>To try and get a clearer idea of how serious (or not) this issue is, TorrentFreak contacted both MEGA and Koziarski for comment on the new tool. We are yet to receive a response but in the meantime the latter is suggesting that while any site uses Javascript for security, the highlighted problem cannot be overcome.</p>
<p>&#8220;Does this code hack or break into MEGA? No, it simply demonstrates one of the many serious and insoluble problems you face when doing cryptography in Javascript web applications. There are many other problems like this which is why numerous respected cryptographers have warned against doing this for years,&#8221; he concludes.</p>
<p><strong>Update:</strong> Both MEGA and Koziarski are preparing answers to our questions so those will be published here as soon as we have them.</p>
<p><strong>Update 2:</strong> Comments from Michael Koziarski</p>
<p><em>I made the tool because I&#8217;d noticed that people fell into one of two camps when it came to MEGA&#8217;s encryption. If they knew about the limitations of in-browser JavaScript cryptography, they understood that MEGA&#8217;s cryptography could easily be bypassed by MEGA or anyone else with access to their web servers. But users who didn&#8217;t know anything about cryptography seemed to think that there was something amazingly secure about MEGA.</p>
<p><em>By contrast, if you encrypt your files with PGP before uploading them, there&#8217;s nothing MEGA or anyone else can do to recover them. We already have the tools we need to [cure the problem].</em></p>
<p>I released MEGApwn to make it easier to show novice users how easily MEGA (or the Feds with a warrant) could circumvent the encryption if they wanted to. Everyone in the infosec industry already knew this.</p>
<p>As for how it works, it&#8217;s very very simple. Browsers don&#8217;t have a secure location to store sensitive data like your master key, so MEGA uses the html5 local storage API. However this data is available to anyone using your computer, or any JavaScript code running on the mega.co.nz domain. MEGApwn simply reads the key from localstorage and displays it to you.</p>
<p>Fundamentally the problem is that your browser will faithfully execute any code it downloads from mega.co.nz, and your browser has to download that code basically every time you visit the MEGA site.</p>
<p>MEGA have configured their web servers for SSL and HSTS, and don&#8217;t embed any third party code on their site, so it&#8217;s relatively secure against a 3rd party injecting code.</p>
<p>If they wanted to, any MEGA employee could include code which extracted your secret key and uploaded it to their servers. It wouldn&#8217;t warn you, it wouldn&#8217;t be obviously broken, you&#8217;d just never know. We know from the Hushmail case[1] that courts will issue warrants compelling them to do so in some circumstances,</p>
<p>When you get down to the root of the issue, MEGA&#8217;s approach to cryptography is secure if, and only if, you trust MEGA not to extract your keys[2]. From where i sit that&#8217;s not all that different from having to trust any other more traditional cloud storage provider not to read your files.</p>
<p>It&#8217;s important people understand that. </em></p>
<p><strong>Update 3:</strong> Comments from Bram Van der Kolk of MEGA</p>
<p><em>We would like to thank a high-profile member of the MEGA community for highlighting two of the potential security risks associated with using computers in general and JavaScript-based cryptography in particular. All of these issues have been covered in our FAQ from the start, but we would like to use the opportunity and reiterate them here in case you have missed that:</p>
<p><em>1. If you have access to a computer, you can break MEGA (and everything else, too)</em></p>
<p>This problem is illustrated by a MEGA-specific browser bookmarklet that allows the victim to break into his or her own MEGA account. A more generalized approach is outlined in Brian Kaplan&#8217;s paper RAM is Key &#8211; Extracting Disk Encryption Keys From Volatile Memory. And, needless to say, if the victim installs remote monitoring software (such as a keylogger/screen grabber) on his machine, the potential security breach becomes pretty much all-encompassing.</p>
<p>2. JavaScript cryptography is weak, because the code is loaded on the fly</p>
<p>There are two trust issues associated with on-the-fly code loading: How secure is the delivery mechanism? And will the service provider send me trojaned code upon receipt of e.g. a National Security Letter?</p>
<p>2.1 JavaScript delivery</p>
<p>The integrity of our JavaScript code depends on the integrity of all SSL certificate issuers that your browser trusts, plus the ISPs between you and our root server cluster and/or the DNS servers involved. Or, put bluntly, &#8220;if you can break SSL, you can break MEGA&#8221;. Of course, if you can break SSL, there might be more interesting targets for you to break than MEGA&#8230;</p>
<p>In addition, we are continuously monitoring our root and API server SSL certificates from a variety of points around the globe. Should any breach be detected, we will immediately shut down MEGA and only resume service once the situation is clarified.</p>
<p>2.2 Intentional delivery of backdoored JavaScript code by us to specific users</p>
<p>Technically, we could serve you backdoored JavaScript code that sends your master encryption key back to us. But that would be pointless, because any such attempt could easily be detected and would completely ruin our credibility. Some juristictions force service providers to install backdoors, but MEGA will always migrate to a jurisdiction that respects your right to privacy instead of putting your data at risk. Major software vendors, e.g. in the United States, could easily be forced by their local government to abuse their update mechanisms to deliver backdoor code to specific targets. We will never provide any government with any backdoors, period.</p>
<p>The fundamental difference between traditional (server-side encrypting) and secure (client-side end-to-end encrypting) cloud storage providers is that the former can intercept all data of all users without the victims having a way of finding out, while the latter have to do something that is detectable on the client side.</p>
<p>2.3 Solutions</p>
<p>If you are worried about the risks outlined above, you should use MEGA in a way that does not rely on code delivered on the fly.</p>
<p>2.3.1 Loading MEGA&#8217;s JavaScript code base from your local machine</p>
<p>We offer a browser extension (currently available for Chrome, coming soon for Firefox) that holds all of MEGA&#8217;s code locally. If you install a version that someone you trust has code-audited and turn off automatic updates, we cannot backdoor you even if we wanted to.</p>
<p>2.3.2 Using a client application</p>
<p>In a similar vein, non-autoupdating client applications that were written or audited by someone you trust are immune against dynamic backdooring.</p>
<p>3. Untrusted JavaScript loaded from a website is still safer than an untrusted executable loaded from the same website</p>
<p>It is a common misperception that JavaScript is inherently insecure and that native machine code is a much better choice for cryptography. While it is true that full access to the host machine&#8217;s features allows for some additional degree of security (such as preventing keys from being sent to swap space), malicious JavaScript executing in your browser&#8217;s sandbox (assuming, of course, that no known browser vulnerabilities exist — an admittedly rather weak assumption) at least cannot take over your entire user account or, if you work as root/Administrator, system!</em></p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/new-browser-tool-claims-to-reveal-mega-user-master-key-130903/feed/</wfw:commentRss>
		<slash:comments>164</slash:comments>
		</item>
	</channel>
</rss>
