What Megaupload's Demise Teaches about Cloud Storage
Takedown of the file-sharing site over copyright violations provides a warning about being careful where you store stuff.
PC World - Megaupload users are crying foul after their personal files, not necessarily copyright-infringing material, stored with the file-sharing service was seized on Thursday along with a trove of illegally distributed copyrighted works.
Some of those users took to Twitter complaining about the loss of their files, as first reported by TorrentFreak. "I had files up there...gone forever..and they were personal recordings! No copyright infringement!" said Twitter user J. Amir. Another user complained that her work files were now gone, and others used more colorful language to describe their predicament.
The Megaupload seizure shows how personal files hosted on remote servers operated by a third party can easily be caught up in a government raid targeted at digital pirates. But perhaps more importantly, the demise of Megaupload shows that you must be careful about where you trust your data, when picking a cloud service.
The U.S. Federal Bureau of Investigation called the Megaupload seizure and the arrests of four of its key employees in New Zealand one of the "largest criminal copyright cases ever brought by the United States." Federal authorities, dubbing the alleged criminal acts the "Mega Conspiracy," accuse the site of harming copyright holders in excess of $500 million in damages and claim Megaupload earned more than $175 million for its investors and employees.
Before its closure Megaupload had 180 million registered users and an average of 50 million daily visits, claimed a total visitor history of more than one billion, and accounted for about four percent of all global Internet traffic, according to the indictment filed in U.S. District Court in Alexandria, Virginia.
Megaupload was one of many sites run by the company including Megavideo, a popular site for finding free streaming video of pirated television shows and movies.
Megaupload's Storage Policies
It's not clear how many of Megaupload's 180 million registered users relied on the company to store non-copyright-infringing personal files, but it appears at least some people were. Megaupload may not have been the most trustworthy service to rely on for long term data storage.
The Mega Conspiracy indictment says that non-registered free users would have to download their files at least once every 21 days or Megaupload would delete the content. Registered free users had to download their files at least once every 90 days or their data would also be deleted. Paying users, however, could store files for as long as they wanted without downloading as long as they continued to pay for a premium membership.
Picking a Cloud
Regardless of Megaupload's policies, it appears at least some users were storing files with the company and not bothering to back up the files on a local hard drive. As these users recently discovered, it turns out to be a bad idea to store files with aA cloud service that allegedly relies on piracy for a big part of its revenue.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts