In light of recent research into the security of end-to-end encrypted cloud storage systems, it’s becoming increasingly clear that while many services claim to offer privacy, few can truly deliver on that promise. A recent paper, End-to-End Encrypted Cloud Storage in the Wild: A Broken Ecosystem (source), analyzed five major E2EE cloud storage providers and found numerous vulnerabilities.
Confident that its unique approach to encryption makes it a far more secure option. Security is built into the core of our architecture, ensuring that your data remains fully under your control—no matter what. We are proud to say that the weaknesses identified in the research simply do not apply to us. Here’s why:
1. Unauthenticated Key Material
The paper highlights how providers like Sync and pCloud fail to authenticate key material, allowing attackers to inject malicious keys into the encryption process.
This puts user data at risk. At Züs, however, the encryption keys are securely generated by the client, meaning that blobbers (storage providers) have no access to them and cannot tamper with the data. Our re-encryption feature—powered by master wallet keys—ensures that key material is as secure as a BLS key pair, making any attempt to compromise encryption virtually impossible.
2. Unauthenticated Public Keys
Sync and Tresorit are criticized for using unauthenticated public keys, which can be exploited by a malicious server. Züs solves this problem by ensuring that all public keys are authenticated and derived directly from master wallet keys, preventing unauthorized access and ensuring data confidentiality.
3. Protocol Downgrade
In the case of Seafile, attackers can force a protocol downgrade, allowing them to brute-force user passwords. This attack is not applicable to Züs, as our security protocols remain steadfast against such attempts.
4. Link-Sharing Pitfalls
Sync’s approach to file sharing involves embedding passwords in links, which exposes them to malicious actors. In contrast, Züs ensures that file encryption is personalized—only the intended recipient of a shared file can decrypt it, making this attack vector non-existent.
5. Unauthenticated Encryption Modes
The paper points out that Icedrive and Seafile use unauthenticated cipher modes like CBC, which can be exploited to tamper with file contents. This is not applicable to Züs, as we employ authenticated encryption methods to ensure file integrity.
6. Unauthenticated Chunking
Seafile and pCloud are vulnerable to attacks that involve unauthenticated chunking, allowing files to be tampered with by swapping or removing chunks. At Züs, file integrity is protected by ranged Merkle trees, with the user’s signature on the root. This means it is impossible for any chunk to be tampered with or replaced.
7. Tampering with File Names and Locations
Other providers fail to cryptographically bind file names and locations to their contents, making it possible for attackers to swap or move files around. In Züs, every upload request is signed by the user, ensuring that file names and locations cannot be tampered with.
8. Tampering with File Metadata
The lack of metadata authentication in other systems is another vulnerability highlighted in the paper. Züs takes metadata security seriously: all metadata is authenticated, making it impossible for attackers to alter file sizes, types, or modification dates without detection.
9. Injection of Folders and Files
Sync and pCloud are vulnerable to attacks that allow a malicious server to inject folders or files into a user’s storage. Züs has implemented robust protections that prevent any unauthorized file or folder injections, ensuring that only the user can control their storage.
A Call to the Authors: Test Vult and Blimp for True Security
If the findings in the ETH paper are correct, then re-encryption is a game-changing feature for cloud storage security. No one else offers this level of protection, and we believe it’s crucial for researchers, developers, and security professionals to consider Züs as the gold standard in secure cloud storage.
To further understand the cutting-edge cryptographic approaches Züs utilizes, we invite you to explore the following papers, which demonstrate the power of proxy re-encryption and key splitting—core principles integral to Züs’s platform:
Sharing of Encrypted Files in Blockchain Made Simpler
By: S. Sharmila Deva Selvi, Arinjita Paul, Siva Dirisala, Saswata Basu, C. Pandu Rangan
This paper introduces Proxy Self Re-encryption (SE-PRE), a highly efficient cryptographic technique designed for secure file sharing in blockchain-enabled distributed cloud storage. SE-PRE simplifies the process of re-encrypting ciphertexts towards legitimate users via semi-trusted proxies without compromising security or efficiency.
Splitting and Aggregating Signatures in Cryptocurrency Protocols
By: S. Sharmila Deva Selvi, Arinjita Paul, C. Pandu Rangan, Siva Dirisala, Saswata Basu
This work explores the cryptographic efficiency of key splitting and aggregation techniques, which are crucial for improving scalability in blockchain and cryptocurrency protocols. The paper proposes using the BLS short signature scheme, which excels at both key splitting and aggregation, offering enhanced computational efficiency.
Contact Information
If you are part of the research team or wish to discuss Züs’s security further, we would love to hear from you at store@zus.network.