• RmDebArc_5@sh.itjust.works
    link
    fedilink
    arrow-up
    13
    ·
    20 hours ago

    How it works: I don’t know about this service in particular, but usually the shared contains the encryption key so like this: example.com/files/file_id/encryption_key or something similar

    As for trust: This appears to be a individual, so you will have to just trust it when using the public instance. However, since it is FOSS, you can audit the code and spin up your own instance

    • peregus@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      10 hours ago

      How it works: I don’t know about this service in particular, but usually the shared contains the encryption key so like this: example.com/files/file_id/encryption_key or something similar

      But if the key is in the URL, that’s provided by the server, where’s the utility of the encryption since the server knows it and so does everyone that has the URL?

      • flux@lemmy.ml
        link
        fedilink
        English
        arrow-up
        1
        ·
        10 hours ago

        So the trick is to use the #fragment part of the URL, that is not sent to the server.

        Of course the JS one downloads from the server could easily upload it to it, so you still need to trust the JS.

        • peregus@lemmy.world
          link
          fedilink
          arrow-up
          1
          ·
          10 hours ago

          But the JS code could be checked on the webpage, correct? If so, the page could be trysted (if vetted).

    • Handles@leminal.space
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      18 hours ago

      spin up your own instance

      Absolutely. If you’re at all worried about sending files through third party sites, set up your own. Provided you trust your own security skills, of course.

      I would certainly be more interested in having an install under my own domain than using some rando’s that I don’t know.