website statistics

Kim Dotcom's new venture, Mega, has allowed a select few to test out the service. And the service provides great security to the uploaded data, although it may not do very well towards user privacy.

What is the next Gadget you want?

View Results

Loading ... Loading ...
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading ... Loading ...

When Kit Dotcom launched an all-new Mega as a replacement for the now late MegaUpload, we had hoped that the new service would be meant to safeguard the anonymity and privacy of the users. However, whereas the new Mega is big on security, encrypting all uploaded data, it does fall short of providing adequate privacy features.


mega

For now, the service has been offered to only a limited number of users who were given an ‘early’ look. According to Torrent Freak guys, who were among those able to take a test-shot at the service, the encryption feature of the website is rather excellent.

Data security and encryption
This is how it works: whenever any user uploads a file, the encryption feature automatically encrypts that data so that only the uploader is able to read it or any other user who has received the public key from that user. This way, the encryption ensures that no third-party is able to look into the data and see what it contains.

Dotcom believes that this is a very viable method to secure data and hopes that, “Our easy to use one-click privacy feature will turn encryption into a mass product. We believe within five years half of all Internet traffic will be encrypted with solutions born from our new API.”

User privacy
However, what is rather contentious about the new Mega service is the fact that it tends to invade user’s privacy rather than granting it. The terms of use offered by the service clearly state that:

We keep the following personal information:

- When a user signs up for particular services on our website they may need to give us the details required in our registration form and keep that information up to date;
- Communication logs, traffic data, site usage and other information related to us supplying the services (including for serving of advertising material on our site);
- Any personal information included in data uploaded to our system including but not limited to registration information.

We keep records of IP addresses used to access our services.”

Moreover, the service will also dish out any information regarding its users that the law enforcement agencies may require. There are other rather ambiguous terms that seem to hint that the privacy of the users may not be the paramount concern of the service. However, given the fact that the data hosted by the service would be encrypted, it is rather good to note that the authorities may not be able to gain legal permissions against Mega users easily.

Source: Torrent Freak

Buy Cheapest Related Product From Amazon.com


OSI X-Ray Body Scanners Removed From US Airports

[Tutorial] How to Jailbreak Your iPad 3 Using RedSn0w – Windows
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On January 19, 2013(1 year, 3 months ago.)

Recent Search

Recent Tutorials

At the beginning level, many people don't know how to use Gmail properly. For them, a here's a helpful guideline.
Skype now allows you to call directly from your Outlook account. Find the step-by-step installation process from this tutorial.
This tutorial helps you quickly resolve four of the most common problems that occur with Windows XP.
After releasing Look Back, many people didn't like it. So Facebook planned to add an Edit tool to the feature and now you can edit your Facebook Look Back video.
Do you want to record Skype calls but don't know how to do that? Then this guide is absolutely for you. Get inside the article for details.
Do you know that many companies can track you on Facebook? Do you want to know who they are? Do you want to block them?
So you've been planning on replacing your old hard drive with the new drive? This tutorial helps you with a few simple steps.
Bitcoin is a digital currency that has gained extraordinary momentum in the last few months. This tutorial helps you get started with the basics.
Android lockscreen can be secured in a number of ways, some of which are described in this brief tutorial.
This review of iSkysoft Video Converter tells you everything you want to know about this Win 8/7 compatible video/DVD tool. Check the below to learn more details.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook