This repository has been archived by the owner on Mar 16, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 898
bypassing cloud providers data validation is a general problem for a while 馃樅 #4
Comments
gsmachado
changed the title
bypassing cloud storage validation is a general problem for a while 馃樅
bypassing cloud providers data validation is a general problem for a while 馃樅
Feb 20, 2023
BTW, if anyone is interested to read more about it: I even implemented a peer-to-peer overlay network "exploiting" the weak data validation of several cloud providers in the past... check it out: https://ieeexplore.ieee.org/document/6838281 I have my code backed up in my old hard drives... just need to find it. 馃槄 well... drop me a line on Discord or Twitter. 馃崁 |
Storing data in video is very inefficient because of video encoding and the need to bypass compression. The same is true for audio. |
Did some anime girl write this issue? |
Yes. And it worked: got your attention. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hey all 馃憢
It's great to see this repo! Awesome!
I detected this problem in 2013 (10 years now! 馃槷), when I authored the paper:
"Bypassing Cloud Providers' Data Validation to Store Arbitrary Data"
Available at:
The paper showed several techniques on how to bypass the "file validation engine" of several cloud providers (like Google, Twitter, etc) to store files (i.e., arbitrary data). The different techniques included files encoded within images, videos, audio (mp3), videos with QR code, etc., and uploaded to several Cloud providers. An actual evaluation was done back then. 馃槄
It's incredible to see that this "problem" STILL exists at scale and, as I expect, will remain for many many years to come. 馃槃 At that time I tried to contact some providers trying to help to detect this kind of stuff but, obviously, no answers.
I'm happy to a) discuss this further; and b) re-evaluate several cloud providers nowadays; if anyone is interested. 鉁岋笍
The text was updated successfully, but these errors were encountered: