Advertisement

We need your help now

Support from readers like you keeps The Journal open.

You are visiting us because we have something you value. Independent, unbiased news that tells the truth. Advertising revenue goes some way to support our mission, but this year it has not been enough.

If you've seen value in our reporting, please contribute what you can, so we can continue to produce accurate and meaningful journalism. For everyone who needs it.

Jennifer Lawrence was one of the people affected by the leak. Doug Peters/EMPICS Entertainment

Should you be worried about whether your cloud data is safe?

The recent image leak involving numerous female celebrities has brought the focus on cloud security, but does this mean your own files are under threat?

WITH THE NEWS of numerous female celebrities having nude or nearly nude photos of themselves leaked, part of the focus has been placed on the cloud services (mainly Apple’s iCloud) which hosted these images and how they were found, despite some of them being deleted.

While these images were saved under the (very reasonable) assumption that they were private and nobody would be able to access them, the opposite has occurred. All cloud storage services use a number of security and encryption methods to keep data safe, and it’s not entirely clear what happened.

Those of you might be wondering about whether or not your data is safe. If that’s the case, it’s worth looking at the reasons why this might have happened and what you can do about it.

So how were these photos obtained?

This is something that isn’t entirely clear. For one, a service like Apple’s iCloud being hacked might be the first reason people might think of, but it’s also the most unlikely.

According to Apple, it uses “a minimum of 128-bit AES encryption – the same level of security employed by major financial institutions – and never provides encryption keys to any third parties.”

However, a potential exploit was recently spotted on Find my Phone, which is connected to iCloud, called ibrute. The developers behind it announced the bug, which doesn’t employ bruteforce protection (an attack can continue using different passwords until the right one is entered) a day before the images were leaked.

The exploit has been patched, but there’s no evidence as of yet that this exploit would have been used to access these files. There’s also the case of having to obtain email addresses as well to access these accounts, which would have to be found through other means.

More importantly (or worryingly), there’s nothing to suggest that other cloud services were affected by this leak, iCloud just happens to be the only service mentioned so far.

iCloud sign in screen Apple iCloud Apple iCloud

The more plausible reason would have been accessing through passwords and email logins. While two-factor authentication is available for most services – and should be used regardless - few actually use it.

If someone is savvy enough, they could potentially gain access to one account (email for example) through password guessing, or phishing, the practice of sending fake emails to trick someone into entering information – and use that to obtain and change passwords to other services.

Considering that the standard Apple password only requires eight characters, a capital letter, a lowercase letter and a number as security measures, it would mean that many would just opt for the bare minimum for the sake of convenience.

Apple security password The general guidelines Apple offers when creating a password. It's unlikely that many will deviate from the suggestions offered here. Apple.com Apple.com

Also, in the context of deleted photos being recovered, chances are those who took the photos didn’t realise they were uploaded automatically – most cloud services offer such functionality.

The other reason is that although you can delete files, they’re moved to a ‘recycle bin’ which means they’re still available for a certain period of time. It’s possible that some images were recovered through this method.

If you already use a cloud service

If you’re already using the likes of iCloud, Dropbox, Google Drive and OneDrive, you should activate two-step verification (there’s a reason why we’re harping on about it).

It’s also worth looking at third-party services that will encrypt your data first before saving it.

One of the better examples out there is Boxcryptor, which works for all the major cloud storage services (Dropbox, Box, Google Drive, OneDrive). If it’s for personal use, then the (free) basic version will suffice, but if you want greater functionality or a group of people want to use it, then the paid version is €36 per year.

Boxcryptor / YouTube

Alternatively, you could opt for Vivo or Cloudfogger, which offer similar services.

If you don’t use a cloud service or you’re willing to switch

If you’re not fully tied down to a particular service, then it’s better to opt for an encrypted cloud storage service. On top of encryption, the services below employ a zero-knowledge password service, meaning only you know your password. Not even those who run the service in the first place would be able to access your data.

The first one is Tresorit, which offers 5GB when you sign up. It’s similar to Dropbox in that by completing certain tasks, you can increase your storage to 16GB.

One of the main features is you can turn any folder on your computer into a secure encrypted ‘tresor’ meaning you don’t need to re-arrange any data or drag everything into one encrypted folder to keep your data safe.

The pro version allows you to have access to 100GB for €9.99 a month (cost per month depends on how much storage space you want).

tresorit / YouTube

The second is Wuala, which also offers 5GB for €0.99 per month. It also offers 100GB for €9.99 per month although its offer for 20GB (€2.99 per month) is better value than what you would get with Tresorit.

It’s similar to many cloud storage services in that it uses a sync folder to keep everything in order, meaning your files are encrypted locally before they’re sent to the cloud.

WualaTV / YouTube

Read: Thinking of looking at those J-Law nude pics? Here’s why you shouldn’t >

Read: After 15 years, MSN Messenger finally decides to call it a day >

Readers like you are keeping these stories free for everyone...
A mix of advertising and supporting contributions helps keep paywalls away from valuable information like this article. Over 5,000 readers like you have already stepped up and support us with a monthly payment or a once-off donation.

Close
13 Comments
    Install the app to use these features.
    Mute john doe
    Favourite john doe
    Report
    Sep 1st 2014, 4:32 PM

    My cloud is safe. It’s between cloud 8 and cloud 10.

    94
    Install the app to use these features.
    Mute Christopher Duffin
    Favourite Christopher Duffin
    Report
    Sep 1st 2014, 4:42 PM

    But I thought Cloud 7 8 9

    58
    Install the app to use these features.
    Mute john doe
    Favourite john doe
    Report
    Sep 1st 2014, 4:45 PM

    Ha ha, that’s something my son would say.

    28
    Install the app to use these features.
    Mute Dublinjonny
    Favourite Dublinjonny
    Report
    Sep 1st 2014, 4:41 PM

    I’m not Jennifer Lawrence taking naked pics of myself so therefore why would I be the slightest bit worried about security … If I was J-Law all I would do it sit in front of a mirror all day in the nip

    71
    Install the app to use these features.
    Mute Martin Bishop
    Favourite Martin Bishop
    Report
    Sep 1st 2014, 4:35 PM

    The likes of Google and Dropbox allow people to setup their mobile phones as two step verification, this basically means you’ll get a text with a unique code that is needed to login.

    In all honesty if people don’t use the security features available to them then they only have themselves to blame!

    55
    Install the app to use these features.
    Mute Aaron O Connor
    Favourite Aaron O Connor
    Report
    Sep 1st 2014, 6:26 PM

    will someone tell these people that nothing online is safe.

    51
    Install the app to use these features.
    Mute Peter King
    Favourite Peter King
    Report
    Sep 1st 2014, 5:00 PM

    Want to bet her password was jlaw1

    47
    Install the app to use these features.
    Mute Paul Devlin
    Favourite Paul Devlin
    Report
    Sep 1st 2014, 4:54 PM

    I’ve searched and searched online and can’t find any of my naked selfies anywhere. Sexism is alive and well obviously!

    41
    Install the app to use these features.
    Mute Shane Walsh
    Favourite Shane Walsh
    Report
    Sep 1st 2014, 4:36 PM

    The only thing I keep in the cloud is my head.

    38
    Install the app to use these features.
    Mute Lee Jones
    Favourite Lee Jones
    Report
    Sep 1st 2014, 5:51 PM

    why would you want to put pictures of yourself in the nip in the cloud clown!

    25
    Install the app to use these features.
    Mute DamoDeMan
    Favourite DamoDeMan
    Report
    Sep 1st 2014, 7:38 PM

    If you do not want photos of yourself naked to get out
    then
    Do not take photos of yourself naked

    22
    Install the app to use these features.
    Mute Martin Grehan
    Favourite Martin Grehan
    Report
    Sep 2nd 2014, 1:25 AM

    If you do not want to be raped, then do not leave the house.

    See how ridiculous you sound?

    10
    Install the app to use these features.
    Mute tractor1000
    Favourite tractor1000
    Report
    Sep 1st 2014, 8:51 PM

    Is there no decent perv out there that could tell me where i can see these nudie photos??

    12
Submit a report
Please help us understand how this comment violates our community guidelines.
Thank you for the feedback
Your feedback has been sent to our team for review.
JournalTv
News in 60 seconds