• Constant Pain@lemmy.world
    link
    fedilink
    arrow-up
    18
    arrow-down
    1
    ·
    7 days ago

    Disabling index and making the names UUID would make the directory inviolable even if the address was publicly available.

    • Valmond@lemmy.world
      link
      fedilink
      arrow-up
      1
      ·
      6 days ago

      Bet you could reuse/keep UUIDs for someone/stuff that gets updated and get that new data even if you “shouldn’t”.

      It could work in theory but in practice there are always a billion things that go wrong IMO.

      • Constant Pain@lemmy.world
        link
        fedilink
        arrow-up
        13
        arrow-down
        2
        ·
        7 days ago

        It’s not security through obscurity in this case. The filenames can’t be obtained or guessed through brute force. At least not with current technology or processing power…

        Security through obscurity is when you hide implementation details.

        Saying that my suggestion is security through obscurity is the same as telling that ASLR is security through obscurity…

        • Scrappy@feddit.nl
          link
          fedilink
          arrow-up
          1
          ·
          6 days ago

          Until the psuedo random UUID generator can be reverse engineered. Makes me think of this video: https://youtu.be/o5IySpAkThg

          Anyway, I think we’re on the same wavelength and both agree that the implementation as is isn’t production-ready to say the least ;)

    • wizardbeard@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      16
      arrow-down
      5
      ·
      7 days ago

      Sounds like a good case for brute forcing the filenames. Just do the proper thing and don’t leave your cloud storage publicly accessible.