![]() ![]() ![]() For peer discovery the secret is hashed, so the hash can be used to find peers with a matching secret withing having to make the secret public.īefore further reverse-engineering BitTorrent Sync, keep in mind that the software is closed source and it includes routines to automatically update from. In particular this includes a key for encryption of files for transmission between peers. secrets with encrypted peer support for read-only encrypted accessĪs far as I understand (and stated in this thread where someone tried to reverse-engineer the BitTorrent Sync protocol in July 2013) the latter three types of secrets can be derived from the master secret.one-time secrets (both full access and read-only).Simple laws of probability make it virtually impossible to guess. BitTorrent intends to monetize Sync by offering enterprise-level features.As stated by BitTorrent (see also the user guide), the secret is a randomly generated key of 20 bytes or more. I would expect to see more of this (and various public shares of data) more often in the future.īonus: Replace Dropbox with BitTorrent Sync and a Raspberry PiīitTorrent Sync is currently in a public beta. I can’t recall where I saw this, but the idea that a location would be available to anyone to add or remove anything in public is a really compelling social experiment. Share the folder’s Sync read-only key with friends (and on Twitter) and let anyone who’s interested keep up-to-date as you add new content. You don’t want to email each file out as you add them and want something more automatic. That awesome batch of sunset photos is growing and you’d like to show everyone that wants to see them. Use this scenario on all family member’s computers and create a multi-computer backup system that protects everyone’s data, all the time. Sync would be set up to watch live share folders and synchronize in a read-only pattern back to the NAS device.īy placing Sync on every computer possible and designating a folder for your data, this might effectively distribute backups to multiple places and protect you from hardware failure. Setting up large storage space (possibly Network Attached Storage) and using Sync to pull in files from all client locations as a central backup tool. The mobile nature of laptops forces users to be in and out of the office, but setting up a Sync-centric folder structure for a user’s to read and edit files could keep all the data updated and centralized on the company’s file server. Pairing the generated key with a passphrase or some other method if the optional user-created lock could make the tool even more secure. While the likelihood of anyone guessing keys like “AHG2SAAF73LNARY9D1BT6QNCMAFL7Z8WE” is low, the possibility does exist. You can use or generate as many Secrets as you need.” The Secret is a fully random 160-bit key that’s impossible to brute force. BitTorrent themselves explained this level of authentication: The challenge, however, is that the generated secret key is all that a bad guy needs to gain access to files and possibly delete them. With people more paranoid than ever, Sync is, by nature, a secure service. Since I’ve had the chance to look at BitTorrent Sync back in April, a number of thoughts have come to mind that I thought I’d share. The basic idea is to keep files synchronized between two or more devices – much like Dropbox, but without storing these files on a server. But, because of its simplicity, it allows for uses far beyond even what the authors might have envisioned. BitTorrent Sync is amazing in a number of ways.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |