SpiderOak’s Analysis and Recommendations for the Crypto in Kim Dotcom’s Mega, Part One
Beyond our caveats above, Mega’s first “hair on fire” problem is the implementation of their Key Derivation Function. This function’s job is to take a (probably weak) passphrase and 1) turn it into a usable symmetric key that can encrypt secrets and 2) do so in a way that is not easily brute forced. The first part it does well; the second part it hardly does at all.
Have you ever been away from your computer and needed to check out a specific doc in your Dropbox? Instead of having to wait and download the whole thing, you’ll soon be able to grab a preview straight from your browser. This’ll work for your docs, code snippets, and presentations.