Replies: 4 comments 3 replies
-
Definitely not FUD, but maybe not as bad as it may sound at first. See there: https://github.com/borgbackup/borg/wiki/CDC-issues-reported-2025 |
Beta Was this translation helpful? Give feedback.
-
Thank you Thomas for a detailed explanation, but still some things are not clear to me. There is a high probability that I am too thin for it :( If I'm too stupid, explain it like a fool:
|
Beta Was this translation helpful? Give feedback.
-
I think I have only now understood the real level of threat = virtually no threat in my case. The initial reaction "damn my backups are threatened" was blushed ;) |
Beta Was this translation helpful? Give feedback.
-
Author of the parallel "Breaking and fixing" paper here. The "fingerprinting" threat model is probably outside of what most users are worried about. Borg's docs discuss it here, and Kien has a blogpost out. The The optimal approach probably involves a stronger chunking algorithm (where it is not possible to recover the chunking secret by just looking at one chunk, e.g. generating the BuzHash table randomly instead of xoring with a fixed value, and a 64 bit seed) and an efficient padding scheme (like padme). This would stop fingerprinting for both small and large files, and have a storage cost of at most 12%. |
Beta Was this translation helpful? Give feedback.
-
Hi folks!
https://news.ycombinator.com/item?id=43438601
Can someone professionally explain to an amateur if this "attack" is an attack at all?
Beta Was this translation helpful? Give feedback.
All reactions