Can the regime spy on your online backup?

Is Carbonite's encryption process open source? If not, I wouldn't trust it.

Well, actually, anything you do on Windows, I wouldn't trust...
 
Is Carbonite's encryption process open source? If not, I wouldn't trust it.

Well, actually, anything you do on Windows, I wouldn't trust...
No. If you read the article, Carbonite is the only one mentioned that is trustworthy. Windows has a bad rap (in some cases deservedly), but Carbonite isn't a Windows thing. It works for all OSes that I know of.
One big tech company that hasn't been mentioned in this controversy is Carbonite. Despite millions of customers and an untold amount of data, it's off of the NSA's radar. Why is that?For starters, it's the state-of-the-art encryption that Carbonite offers. It secures your files with 448-bit Blowfish encryption. That's the most rock-solid encryption method available
- See more at: http://www.komando.com/tips/index.a...5-article-1-end-b&page=2#sthash.ngquypIc.dpuf
Why do you people ask these questions before reading the article? FFS!
 
Last edited:
No. If you read the article, Carbonite is the only one mentioned that is trustworthy. Windows has a bad rap (in some cases deservedly), but Carbonite isn't a Windows thing. It works for all OSes that I know of.

Why do you people ask these questions before reading the article? FFS!

And you "trust" that the encryption key isn't either:
1) being secretly collected by Carbonite (at the request/demand of FedGov)
2) being secretly collected by Windows (at the request/demand of FedGov)

?

You can have 800 thousand billion bit encryption, don't mean shit if your key isn't secure
 
And you "trust" that the encryption key isn't either:
1) being secretly collected by Carbonite (at the request/demand of FedGov)
2) being secretly collected by Windows (at the request/demand of FedGov)

?

You can have 800 thousand billion bit encryption, don't mean shit if your key isn't secure

Carbonite allows customers the option of encrypting the data with the customer's own key.
 
Carbonite allows customers the option of encrypting the data with the customer's own key.
Wasn't there a program that would install itself as an update (iTunes I recall specifically being listed) and upon other things recorded keystrokes? Are there not programs that will record your password even if you created your own key?

I don't remember the name off hand. It was posted here and you might know what I am referring to.
 
I just keep everything in my head , I only back up something @ work , lol
 
I don't care how secure the encryption is, don't store important data on somebody else's servers. You want access to that data possibly someday, well you might not get it if the company goes out of business or the grid goes down due to a catastrophe. Store important data on your own media in multiple secure locations and encrypt it as well. If it is not that important though, then store it on any cloud, and you don't really need to encrypt it either. Most people's data is not that important that it needs encryption, just only a small part of it like passwords, and well, you know, plans to, well, forgetaboutit.
 
Wasn't there a program that would install itself as an update (iTunes I recall specifically being listed) and upon other things recorded keystrokes? Are there not programs that will record your password even if you created your own key?

I don't remember the name off hand. It was posted here and you might know what I am referring to.

That's just spyware. There are lots of those and it's really a separate issue from a backup plan - nothing on your computer is safe with such issues present.

I don't care how secure the encryption is, don't store important data on somebody else's servers. You want access to that data possibly someday, well you might not get it if the company goes out of business or the grid goes down due to a catastrophe. Store important data on your own media in multiple secure locations and encrypt it as well. If it is not that important though, then store it on any cloud, and you don't really need to encrypt it either. Most people's data is not that important that it needs encryption, just only a small part of it like passwords, and well, you know, plans to, well, forgetaboutit.

A good backup plan uses multiple locations, so Carbonite could be just one component in such a system. Pretty much all companies with formal backup systems rely on outside vendors.
 
That's just spyware. There are lots of those and it's really a separate issue from a backup plan - nothing on your computer is safe with such issues present.
There was a government one that was supposed to be especially vicious. I believe it was a Wired article that was reporting it. It installed itself through the update feature and the example they gave was iTunes. It used a backdoor to disable virus protection to not detect it and recorded your information. As I recall anyways, it's been a little while.

I'll have to find it tomorrow, I believe damian is who posted the thread on it. Hopefully he responds and saves me the trouble. I can't remember wth the thread was titled.
 
Ya, I know. But if you are entering that key into their closed source software, what guarantees do you have that they aren't collecting your key anyway?
 
Do you run Windows or MacOS?

Carbonite claims that the file is encrypted before being uploaded to their server. This makes them HIPPA compliant and they also claim they have no way to unlock the data. If they are lying about this, then they are opening themselves up for an enormous lawsuit. Wouldn't it just be easier for them to encrypt the file before upload?
 
its been reported lately that anyone who uses encryption for anything is automatically flagged by the NSA. Even if they can't crack the encryption, they are storing the info and will hold it until they have a supercomputer that will crack it. I have read articles (too lazy to post) that soon (if not now) they will have the computing power.

Also, avoid CC permits; automatic NSA flag. Those databases are openly shared among all these crooks.
 
They are nowhere near cracking modern encryption. If you had a processor 1 trillion times more powerful than the theoretically most powerful computer/botnet/cluster tody, you could not brute force a randomly generated 2048-bit key for centuries. The numbers on this stuff are gastronomically high.

There is a theory that quantum processors will make public key infrastructure obsolete (although symmetric keys will still work), but nobody has made any type of quantum processor - it's all highly theoretical.

If they are storing encrypted data, it is more likely they do it so that if they come upon the private key, then they can decrypt the data.
 
They are nowhere near cracking modern encryption. If you had a processor 1 trillion times more powerful than the theoretically most powerful computer/botnet/cluster tody, you could not brute force a randomly generated 2048-bit key for centuries. The numbers on this stuff are gastronomically high.

There is a theory that quantum processors will make public key infrastructure obsolete (although symmetric keys will still work), but nobody has made any type of quantum processor - it's all highly theoretical.

If they are storing encrypted data, it is more likely they do it so that if they come upon the private key, then they can decrypt the data.

http://www.ronpaulforums.com/showth...quantum-computer-NSA-surveillance-turns-to-AI
 
what if all encryption really originated at the NSA? Are there really any independent thinkers that have invented an encryption technique that doesnt have origins at the government/spy level? you can argue they 'learned' on their own, but does the system they invent have origins that are truly original?

think about it...
 
Back
Top