When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Crooks would also be able to tamper with some metadata in the storage.
More importantly - nation-state threat actors.
In fact, they argue its the most realistic adversary model for E2EE cloud storage.
Icedrive is yet to address the issue, while there are no reports for pCloud just yet.
ViaThe Hacker News