On Wed, Apr 13, 2011 at 7:52 PM, Andrew S. Baker <asbz...@gmail.com> wrote:
> Back to me and my 15% shared storage.  If the full system of one of the
> people who I share a set of folders with becomes compromised, some 3rd party
> could setup a separate machine that would allow them to install DropBox and
> get access to 100% of the victims files, plus 15% of my files ...

  Without knowing where this host_id might be used and what it does,
we're really just guessing.

  As a hypothetical example, suppose the host_id is passed around in
URLs in email for some reason.  Now an attacker just needs to sniff an
email (read a postcard) to get access to the Dropbox share.

  I don't know if Dropbox has reason to email one of these URLs.  This
is just an example of how things can go wrong in ways that aren't
always immediately apparent.

  We have insufficient data for a meaningful answer.

-- Ben

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to listmana...@lyris.sunbeltsoftware.com
with the body: unsubscribe ntsysadmin

Reply via email to