Hacker News new | past | comments | ask | show | jobs | submit login

I looked at BTSync the other day when researching self-hosted Dropbox alternatives. It looks like a great product and so far beats the pants off the closest competitor, Seafile, for ease of install and use. I was really impressed.

But unfortunately it's not open source, so it comes down to an issue of trust--which, in the end, is the same issue with Dropbox and really the entire point of moving to self-hosted for me.

Do you trust BitTorrent to properly encrypt your data as they promise? To not send it to someone else on the sly? Etc. etc. I acknowledge the possibility of funny business is remote at best but it's one of those "on principle" things for me.

(Yes you could use another layer like Encfs or something before putting it in your BTSync/Dropbox folder but that's a pain and not really the point.)




I fully agree with that. Trusting crypto in a closed-source product is something I'm not comfortable with. That said, I'm using btsync just for syncing unimportant files across clients within my local network and it's working really great.



Did you ever evaluate http://owncloud.org/ ? I have never used it, but looked at briefly awhile back and it is open source.


From almost everyone I've heard that's tried it it's unfortunately extremely buggy.


Same here, did not hear very good things about it.


Good to know, thx.


the linux server is implemented in java, which is pretty heavy for my 512mb ram box


Tooo hard to set-up, once you set it up it's a pain to use it and then it's a lot bigger pain to keep it running.


How hard would an open source equivalent of BTSync be to create? This isn't advocacy; it's just a literal question. In a world where everyone uses multiple devices to access his or her "stuff", it seems as though something as fundamental as secure file sync'ing is going to become fundamental infrastructure in which an open source solution would be strongly preferred. How likely it is to happen soon would depend on how hard it is to do.


"Do you trust BitTorrent to properly encrypt your data as they promise? To not send it to someone else on the sly?"

I've currently got BTSync dealing with a bunch of "non-private" data, and EncFS (and BoxCryptor on OS X) encrypting the more private data I'm syncing with BTSync.

I'm still "trusting" the BTSync app not to mess with my machine(s) in unexpected ways - but I have to trust every application I run to do that, Photoshop or Firefox are just as capable of "sending my data so someone else on the sly".

One thing I'm realy liking about the BTSync/EncFS setup is that I can have machines I consider "less trustworthy" to sync/store EncFS encrypted data without having EncFS/BoxCryptor installed or needing the keys. I'm happy enough for a spare machine at work, where other people might have physical access to it, to store EncFS encrypted blobs for me. I'm confident enough that's secured against pretty much everything up to federal law enforcement or nation state level snooping.


I'm confident enough that's secured against pretty much everything up to federal law enforcement or nation state level snooping.

Could you please elaborate what you mean by that? As far as I know, it is not possible to "crack" EncFS or Truecrypt as long as you use reasonably strong password and are able to protect it. Or am I wrong?


What _I_ meant by that (and keep in mind my answer might not be based on the same circumstances/juristiction/type-of-encrypted-data as you) - is that I'm reasonably sure my employers, family members, office-mates, cleaning staff - and even state and local police, will not have access to my data unless I choose to give it to them. At the same time I'm under no impression that federal level law enforcement can manipulate things so I don't really have any choice about whether to hand over my keys (I'm _reasonably_ sure that at least local and state law enforcement where I live are unlikely to use "rubber hose cryptography" to extract my passphrase). And I don't know for sure, but I strongly suspect that various three letter agencies or "nation states" probably do have the resources needed to brute force any password/phrase I'm using (including 25+ character random upper/lower/digit/symbol ones I let 1Password generate, or perhaps they'd just brute force the 6 word mis-spelled 1Password master passphrase).


Ah, thanks for explanation. Also thanks for introducing me to the phrase "rubber hose cryptography", I didn't know that.

It is probably good to keep in mind what you said. All passwords are only as good as your ability to keep them for yourself.

Also remember that if someone (feds) would had physical access to your computer while encrypted data is mounted, then the password doesn't matter. Even if you manage to turn off the computer, they could still decrypt the keys by "cold boot attack"[1] within minutes after shutdown. Actually anybody can do that easily. [2]

For normal-purpose encryption that this thread is about, it would be too much hassle, but if I had something I would want to really encrypt and be sure nobody would get to it, then: 1. I would use multiple layers of encryption with the possibility to decrypt one layer in multiple ways (plausible deniability) 2. Would not rely on password only, but also use some external key/token, maybe something like this: https://www.crypto-stick.com/ 3. Make the access to data quickly destroyable if I choose so. Several options come to my mind. E.g. make the key/token easily destroyable for me. Other option would be to physically destroy the media where data is stored. These would render the data inaccessible if I choose so. I would of course lose the data.

[1] https://en.wikipedia.org/wiki/Cold_boot_attack [2] http://vr-zone.com/articles/bitlocker-pgp-truecrypt-cracked-...


If you are going to trust BoxCryptor you can as well trust BTSync directly.


You could argue that trusting two different entities for encryption and storage is safer than trusting a single entity for both. Two unrelated parties are "unlikely to collude" against you.

Of course I'd rather not have to trust either, especially with encryption. Is there an open source equivalent to BoxCryptor?


BoxCryptor interacts just fine with EncFS on Linux (I don't know if its a reimplementation or just a nice Mac OS X gui wrapper round the EncFS code), and EncFS is GPL.

Note that EncFS "leaks" quite a bit of metadata - you might have problems explaining yourself if you've got files called blockbuster-movie.mpg or kiddie-porn.jpg - in certain configurations those filenames will be exposed (I think BoxCryptor always exposes filenames/directory-structure in the free version).


> Do you trust BitTorrent ...

Note how the company knows how much was synced as reported in the article, although it is unclear exactly what was measured (original file sizes, data transferred, tracker statistics etc). With true privacy the BitTorrent company would have no clue what actually happened.


Would accessing your files using a shared POSIX compatible filesystem that's stored in your own S3 bucket be a possible alternative to self-hosting? With everything encrypted using the NaCl crypto library and stored directly on Amazon S3 with no middleman?

I wanted exactly that and built ObjectiveFS. You can try the free preview at https://objectivefs.com


The main issue he had with BitSYnc was it wasn't open source and you suggest to him not only a closed source alternative but proprietary as well.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: