SpiderOak Woes

2011-04-11 Thread Chris O'Connell
Hi Guys, After seeing the BLU presentation on online backups I decided it was time to get my act together and start to back up my critical files off-site. The only consideration I had was that whichever software I chose needed to be cross platform (linux, mac and Windows). I chose Spideroak beca

RE: SpiderOak Woes

2011-04-11 Thread Edward Ned Harvey
> From: discuss-boun...@blu.org [mailto:discuss-boun...@blu.org] On Behalf > Of Chris O'Connell > > After seeing the BLU presentation on online backups I decided it was time to > get my act together and start to back up my critical files off-site. The I'm sure you're aware of a bunch of direct c

Re: SpiderOak Woes

2011-04-11 Thread Richard Pieri
On Apr 11, 2011, at 10:25 PM, Edward Ned Harvey wrote: > > I'm sure you're aware of a bunch of direct competitors of spider oak - > dropbox, sugarsync, box.net, etc... But they all require you pay for > service over a certain level. Usually by storage. "The first hit is free." :) The "problem"

Re: SpiderOak Woes

2011-04-11 Thread Bill Horne
On 4/11/2011 9:36 PM, Chris O'Connell wrote: This level of customer service isn't really acceptable. Also, I should have more control over my files. Who ever heard of a solution that requires you to delete your account?!? One of my all-time-favorite Dilbert cartoons is appropriate here: http

Re: SpiderOak Woes

2011-04-11 Thread Franco Castro
200$ per month or annually, because with 200 bucks you could rent a server. Sent from my iPhone On 11/04/2011, at 08:36 p.m., "Chris O'Connell" wrote: > Hi Guys, > > After seeing the BLU presentation on online backups I decided it was time to > get my act together and start to back up my criti

Re: SpiderOak Woes

2011-04-12 Thread Chris O'Connell
annually. Good point about the encryption Rich P. On Mon, Apr 11, 2011 at 11:39 PM, Franco Castro wrote: > 200$ per month or annually, because with 200 bucks you could rent a server. > > Sent from my iPhone > > On 11/04/2011, at 08:36 p.m., "Chris O'Connell" > wrote: > > > Hi Guys, > > > > Aft

Re: SpiderOak Woes

2011-04-12 Thread Jerry Feldman
On 04/11/2011 10:48 PM, Bill Horne wrote: > On 4/11/2011 9:36 PM, Chris O'Connell wrote: >> This level of customer service isn't really acceptable. Also, I >> should have >> more control over my files. Who ever heard of a solution that >> requires you >> to delete your account?!? > > One of my al

Re: SpiderOak Woes

2011-04-12 Thread Bill Horne
On 04/12/2011 07:35 AM, Jerry Feldman wrote: > Love it. When I worked for Burger King back in the early 70s, they > discovered that a computer operator had mounted the wrong tape 5 years > earlier, and they had to restate their taxes and financials going back 5 > years. While I was hired primarily

Re: SpiderOak Woes

2011-04-12 Thread Rich Braun
Richard Pieri wrote: > SpiderOak does have one specific, tangible benefit ... > The encryption keys are stored entirely on the clients without any escrow. AFAIK the keys aren't sent to CrashPlan either. Can't prove it because I use their front-end software to set up the backups and I haven't loo

Re: SpiderOak Woes

2011-04-12 Thread Richard Pieri
On Apr 12, 2011, at 10:23 AM, Rich Braun wrote: > > "You may elect to secure your key with a private password or use your own > encryption key. If you elect to use a private key password or your own key, > they will be required before decrypting backup data. IF YOU ELECT NOT TO HAVE > CODE 42 STOR

Re: SpiderOak Woes

2011-04-12 Thread Gordon Marx
On Tue, Apr 12, 2011 at 11:03 AM, Richard Pieri wrote: > Take statements like that with a grain of salt.  A provider could be unable > to recover your passwords but still have access to everything you have stored > there through a master encryption key.  Look for the law enforcement caveat > in

Re: SpiderOak Woes

2011-04-12 Thread Richard Pieri
On Apr 12, 2011, at 11:08 AM, Gordon Marx wrote: > > Pardon my "ignorance", but what is a "master encryption key" going to > do? I upload an encrypted file to them, I keep the key to myself, > there's no way they can use anything to break it. Say that your storage provider uses AES-256 so you hav

Re: SpiderOak Woes

2011-04-12 Thread Gordon Marx
On Tue, Apr 12, 2011 at 11:47 AM, Richard Pieri wrote: > On Apr 12, 2011, at 11:08 AM, Gordon Marx wrote: >> >> Pardon my "ignorance", but what is a "master encryption key" going to >> do? I upload an encrypted file to them, I keep the key to myself, >> there's no way they can use anything to brea

Re: SpiderOak Woes

2011-04-12 Thread Chris O'Connell
Spider Oak Update: I resorted to googling their phone number and called. After being placed on hold for a few minutes I was told no technical support agent was available. The girl at the front desk asked if I would mind emailing support instead. I explained my situation to her and she wasn't ab

Re: SpiderOak Woes

2011-04-12 Thread Richard Pieri
On Apr 12, 2011, at 11:51 AM, Gordon Marx wrote: > > Uh huh. So what you're saying is, doing it wrong will screw you over. For certain values of "wrong". I would say that using any kind of "cloud" storage -- that is, storage pools that you or your organization do not control -- for confidentia

RE: SpiderOak Woes

2011-04-13 Thread Edward Ned Harvey
> From: discuss-boun...@blu.org [mailto:discuss-boun...@blu.org] On Behalf > Of Gordon Marx > > On Tue, Apr 12, 2011 at 11:03 AM, Richard Pieri > wrote: > > Take statements like that with a grain of salt.  A provider could be unable to > recover your passwords but still have access to everything

Re: SpiderOak Woes

2011-04-13 Thread Richard Pieri
On Apr 13, 2011, at 9:04 AM, Edward Ned Harvey wrote: > > You're not being ignorant. The master encryption key comment was misplaced, > or irrelevant in context about crashplan. I don't believe either is true. From my cursory reading, Crashplan's EULA and privacy policy say nothing about law e

Re: SpiderOak Woes

2011-04-13 Thread Gordon Marx
On Wed, Apr 13, 2011 at 2:01 PM, Richard Pieri wrote: >> If you use a private data password, we escrow the locked key for you in case >> computer is lost or stolen; however we cannot use it as only you (the >> customer) know the secret (private data password) to unlock it. > > I see just enough

Re: SpiderOak Woes

2011-04-13 Thread Richard Pieri
On Apr 13, 2011, at 2:13 PM, Gordon Marx wrote: > > I'm not sure if you're being deliberately obtuse, or if you're > honestly not understanding my point. It was not clear to me that you were using an external encryption system. That is, not relying on Code 42 for key escrow. --Rich P. __

Re: SpiderOak Woes

2011-04-13 Thread Rob Hasselbaum
On Wed, Apr 13, 2011 at 2:13 PM, Gordon Marx wrote: > If I upload encrypted data, and I do not give out the encryption key, > then no "master encryption key" is going to let anyone into that data. > If there is some way to break AES-256 or RSA, that's a separate issue. > > Is this efficient in pr

RE: SpiderOak Woes

2011-04-13 Thread Edward Ned Harvey
> From: discuss-boun...@blu.org [mailto:discuss-boun...@blu.org] On Behalf > Of Rob Hasselbaum > > Is this efficient in practice? For example, if I create an encrypted volume > in TrueCrypt, it shows up on the host file system as just a big file. Is > CrashPlan (or any other backup provider) smart

Re: SpiderOak Woes

2011-04-14 Thread Richard Pieri
On Apr 13, 2011, at 10:40 PM, Edward Ned Harvey wrote: > > I'll point out that in order to do so, it is a requirement > that the whole thing be read locally which is disk intensive, and possibly > cpu intensive, but if they live up to the claims, it's not necessarily > network intensive. Someone