Syncthing User Testing

Total Page:16

File Type:pdf, Size:1020Kb

Syncthing User Testing Syncthing user testing Vladyslav Chaban chabavla(at)fel.cvut.cz Table of Contents 1.Abstract.............................................................................................................................................3 2.Goal..................................................................................................................................................3 3.Target group......................................................................................................................................3 4.Pre-screener......................................................................................................................................3 5.Pre-test questionnaire.......................................................................................................................3 6.Testing method.................................................................................................................................4 6.1.Platform....................................................................................................................................4 6.2.Testing setup.............................................................................................................................4 6.3.Tasks.........................................................................................................................................4 6.4.Post-test questionnaire..............................................................................................................4 7.Data gathering..................................................................................................................................4 7.1.Participants................................................................................................................................4 7.1.1.Participant #1....................................................................................................................5 7.1.1.1Participant background as determined by pre-screener and pre-test questionnaire....5 7.1.1.2Tasks............................................................................................................................5 7.1.1.3Post-test questionnaire analysis...................................................................................5 7.1.2.Participant #2....................................................................................................................6 7.1.2.1Participant background as determined by pre-screener and pre-test questionnaire....6 7.1.2.2Tasks............................................................................................................................6 7.1.2.3Post-test questionnaire analysis...................................................................................6 7.1.3.Participant #3....................................................................................................................7 7.1.3.1Participant background as determined by pre-screener and pre-test questionnaire....7 7.1.3.2Tasks............................................................................................................................7 7.1.3.3Post-test questionnaire analysis...................................................................................7 7.2.Result analysis..........................................................................................................................8 8.Outline..............................................................................................................................................8 1.Abstract Syncthing (https://www.syncthing.net/, https://github.com/syncthing/syncthing) is a popular open- source P2P folder synchronization tool, which is mostly used to synchronize folder changes between multiple devices, provide backups and rudimentary revision control. It is written in Go, uses web interface and is available for Linux, OS X, Windows, Android and BSD. The most common use case is to sync work folder between personal and corporate notebooks and NAS or some other long-term data storage to back data up. According to live statistics (https://data.syncthing.net/), the most popular setup is Syntcthing v0.12.24 running on linux-amd64, so this is the one we will be using. The most popular browser between advanced users and computer professionals is Google Chrome, thus Chromium 49.0.2623.108 will be used to access the web UI. 2.Goal User testing should help us discover UI deficiencies from the user's eye view. 3.Target group Software developers with Computer Science/Software Engineering college education. The product's target audience is rather specific and mostly includes “computer geeks”, thus omission of laymen from our selection seems logical. 4.Pre-screener Question 2 points 1 points 0 points Sporadically or How often do you make backups? Weekly Monthly never Do you any automated tools for this? Yes, actively Yes, occasionally No Yes, across Yes, between two Do you use synchronized folders? No multiple devices devices 5.Pre-test questionnaire Pre-test questionnaire is used to get a more fine-grained division of test subjects to enhance results analysis. Question 1 points 0 points Do you know what delta encoding is? Yes No Do you know how DHT works? Yes No Do you know what acronyms TURN and STUN Yes No mean? 6.Testing method 6.1. Platform Hardware Software 15.6” 1366x768 display Cinnamon DE Logitech Anywhere Mouse MX Linux 3.13.0-24 Chromium 49.0.2623.108 6.2. Testing setup The weakest spot of the whole experiment, since testing was carried out in a regular office kitchen with continuous interruptions. 6.3. Tasks 1. Enable automatic synchronization for two directories. 2. Force synchronization of a chosen directory. 3. Add a remote node. Tasks related to installation/maintenance purposes were deliberately skipped due to the fact that the tested application is open-source and multi-platform, and thus there are dozens of ways to install it under different circumstances, i.e., one can install it via PPA, or manually as .deb/.rpm package, or build from source. 6.4. Post-test questionnaire Post-test questionnaires are used to funnel vague user thoughts and feelings into something more accessible and usable in the final analysis. 1. Did you feel lost at any point in the testing process? If yes, when and why? 2. Was there any unexpected behavior, and if yes, where and what were you expecting instead? 3. Do you think there is something missing? 7.Data gathering 7.1. Participants Three author's co-workers, enterprise back-end Java developers in telco field with 1…8 years of commercial development experience. One was vaguely aware of how automated synchronization and backups look like, the second one had experience with BitTorrent Sync and the third, the most advanced in the field, was using plain rsync with a bunch of cron tasks 7.1.1. Participant #1 7.1.1.1 Participant background as determined by pre-screener and pre- test questionnaire. Junior developer, does not use automatic backup and directory sync tools, not particularly well- versed in distributed systems internals, NAT traversal and delta encoding. 7.1.1.2 Tasks 1. The user did stumble on this task, because web UI does not use default file chooser, instead going for a simple combo box. Moreover, the combo box shows only the first 10 entries in the Syncthing folder, which tend to be hidden folders, with names starting with dot symbol, since sorting is lexicographic. 2. There is a big dedicated button for this task, so it was not a problem. 3. Adding a remote node was also fairly simple for the user, though he was really bored from having to manually type in 56-symbol node id. 7.1.1.3 Post-test questionnaire analysis All in all, user was satisfied with the application. His biggest problems were the need to manually type in remote node id (although there is a possibility to export it to QR-code, but desktop versions cannot read from it) and a weird widget selection in directory addition dialog. 7.1.2. Participant #2 7.1.2.1 Participant background as determined by pre-screener and pre- test questionnaire. Junior developer, does use automated syncing tools occasionally, but does not know too much about their internals. 7.1.2.2 Tasks 1. This user did not have the aforementioned directory choosing problem, as he's just started to type in the absolute path immediately. 2. Again, it's not a problem to initiate update before schedule. 3. Same problem with a long ID. 7.1.2.3 Post-test questionnaire analysis This participant had a better experience with the tested application, maybe because he's more used to this class of utilities. However, long ID is still a major culprit. 7.1.3. Participant #3 7.1.3.1 Participant background as determined by pre-screener and pre- test questionnaire. Middle developer, does use automated backup (although with really old-school tools) and knows something about how such things work. 7.1.3.2 Tasks 1. Again, the user has just simply typed the path in, without using any aids. 2. This task seems to be the simplest of three, and this user did not have any issues with it. 3. Yet again, the whole process is relatively simple and logical, but typos in long node ID may infuriate the user, and this was the case. 7.1.3.3 Post-test questionnaire analysis This user had the most positive reaction to Syncthing, but node adding was a pain for him too. 7.2. Result analysis By and large, the application UI is okay, but there is still a field for improvement. 1. Enable users to use a regular file chooser. 2. Add something to bypass a requirement to manually enter node identifier, maybe QR reading from a webcam. 8.Outline While the application is doing its job, isn't too complex and has a great documentation, which is available from its main page, it does seem to somehow favor experienced users. While they are the current audience, it may be worth it spending some time to make it more accessible for non- specialists. Also, every participant mentioned the tedious node ID typing, which seems to be a biggest UX issue..
Recommended publications
  • Synchronize Documents Between Computers
    Synchronize Documents Between Computers Helladic and unshuttered Davidde oxygenizes his lent anted jaws infuriatingly. Is Dryke clitoral or vocalic when conceded some perpetualities hydrogenate videlicet? Geoff insufflates maritally as right-minded Sayre gurgles her immunochemistry slots exaltedly. Cubby will do exactly what is want Sync folders between systems on the internet It benefit cloud options as fresh but they demand be ignored if you'd telling It creates a. Sync Files Among Multiple Computers Recoverit. Cloud Storage Showdown Dropbox vs Google Drive Zapier. This means keeping files safe at the jump and syncing them control all of. Great solution for better than data synchronization history feature requires windows live id, cyber security purposes correct drivers with? If both PC are knew the complex kind no connection and when harm would happen. How to Sync Between Mac and Windows Documents Folder. It is so if they have access recently modified while both computers seamlessly across all backed up with documents or backup? File every time FreeFileSync determines the differences between input source review a target. How to synchronize a Teams folder to separate local Computer. Very much more, documents is well. So sent only sync a grant key files to new devices primarily my documents folder and custom folder of notes It's also five gigabytes of parcel and generally. Binfer is a cloudless file transfer authorities that allows you to sync files between devices without the complex being stored or replicated on any 3rd party systems Binfer. Does Windows 10 have wealth Transfer? File Sync Software Synchronize files between multiple.
    [Show full text]
  • Open Online Meeting
    Open online meeting Project report 2021 1 Content Page ➢ Objectives and background ○ Background, current situation and future needs 3 ○ Purpose and aim of the project 4 ○ Implementation: Preliminary study 5 ○ Functionalities 6 ➢ Results of the study ○ Group 1: Web-conferencing and messaging solutions 7 ○ Group 2: Online file storage, management and collaboration platforms 21 ○ Group 3: Visual online collaboration and project management solutions 30 ○ Group 4: Online voting solutions 37 ➢ Solution example based on the study results ○ Selection criteria 42 ○ Description of the example solution 43 ➢ Next steps 44 2021 2 Background, current situation and future needs Municipalities in Finland have voiced a need to map out open source based alternatives for well-known proprietary online conferencing systems provided by e.g. Google and Microsoft for the following purposes: ➢ Online meeting (preferably web-based, no installation), ➢ Secure file-sharing and collaborative use of documents, ➢ Chat and messaging, ➢ Solution that enables online collaboration (easy to facilitate), ➢ Cloud services, ➢ Online voting (preferably integrated to the online meeting tool with strong identification method that would enable secret ballot voting). There are several open source based solutions and tools available for each category but a coherent whole is still missing. 2021 3 Purpose and aim of the project The purpose in the first phase of the project was to conduct a preliminary study on how single open source based solutions and tools could be combined to a comprehensive joint solution and research the technical compatibility between the different OS solutions. The project aims to create a comprehensive example solution that is based on open source components.
    [Show full text]
  • File Share Options High Level Overview
    File Share Options High level overview mdlug 2020 Pat Baker Pat Baker Information Assurance (CyberSecurity), Intelligence Analyst, Philosophy OtakuSystems LLC otakusystems.com twitter: @otakusystems [email protected] Technologist, Futurist, Philosopher, Geek - Seeker of wisdom and knowledge Disclaimer Not responsible for any damage done to you, your friends, your accounts, your pet goldfish, etc. All information is for educational or general knowledge purposes. Information held within may or may not be legal by your country, state or business. If it's not legal then you should do it? Issues With people moving from place to place and machine to machine (including: Phone, tablet, etc.), getting to your files or keeping them up to date across devices can be difficult. You also want to make sure the files are stored centrally and securely, keeping others from having access that do not need to have like, governments, Businesses or other people. Some file share options covered. From company's: dropbox, google drive, Microsoft, spideroak, ftp/sftp Open source: spideroak, syncthing, NextClout, btsync, samba, sftp/ftp, Hardware: USB thumb drives, HDD Some Issues Getting to the data from multiple machines and locations. Keeping the data secure in transport and being stored. Who owns the data on the servers, of the company goes belly-up can you get it? Do you really know what the company does? Some Issues Ease of use on multiple devices, and the number of devices that can be used. Having a secure centrally located data, but being easy to replicate if needed to other machines. Source of truth (what data is the most current) Others? The big players Owned by big company Dropbox iCloud Google Drive Microsoft Drive Amazon Cloud Storage DropBox Central location of file and folder location, from that location data is transferred to external devices.
    [Show full text]
  • FAQ Release V1
    FAQ Release v1 The Syncthing Authors Jul 28, 2020 CONTENTS 1 What is Syncthing?1 2 Is it “syncthing”, “Syncthing” or “SyncThing”?3 3 How does Syncthing differ from BitTorrent/Resilio Sync?5 4 What things are synced?7 5 Is synchronization fast?9 6 Why is the sync so slow? 11 7 Why does it use so much CPU? 13 8 Should I keep my device IDs secret? 15 9 What if there is a conflict? 17 10 How do I serve a folder from a read only filesystem? 19 11 I really hate the .stfolder directory, can I remove it? 21 12 Am I able to nest shared folders in Syncthing? 23 13 How do I rename/move a synced folder? 25 14 How do I configure multiple users on a single machine? 27 15 Does Syncthing support syncing between folders on the same system? 29 16 When I do have two distinct Syncthing-managed folders on two hosts, how does Syncthing handle moving files between them? 31 17 Is Syncthing my ideal backup application? 33 18 Why is there no iOS client? 35 19 How can I exclude files with brackets ([]) in the name? 37 20 Why is the setup more complicated than BitTorrent/Resilio Sync? 39 21 How do I access the web GUI from another computer? 41 i 22 Why do I get “Host check error” in the GUI/API? 43 23 My Syncthing database is corrupt 45 24 I don’t like the GUI or the theme. Can it be changed? 47 25 Why do I see Syncthing twice in task manager? 49 26 Where do Syncthing logs go to? 51 27 How can I view the history of changes? 53 28 Does the audit log contain every change? 55 29 How do I upgrade Syncthing? 57 30 Where do I find the latest release? 59 31 How do I run Syncthing as a daemon process on Linux? 61 32 How do I increase the inotify limit to get my filesystem watcher to work? 63 33 How do I reset the GUI password? 65 ii CHAPTER ONE WHAT IS SYNCTHING? Syncthing is an application that lets you synchronize your files across multiple devices.
    [Show full text]
  • PDF Or ODT Format, You Will Notice Plenty of ``` in Place of Double Quotes (“”)
    The Hitchhiker’s Guide to Online Anonymity (Or “How I learned to start worrying and love privacy anonymity”) Version 1.0.4, September 2021 by AnonymousPlanet. This guide is still a work in progress. While I am working constantly to correct issues, improve the content, general structure, and readability, it will probably never be “finished”. Some parts might lack information or contain inaccuracies. Your experience may vary. Remember to check regularly for an updated version of this guide. This guide is a non-profit open-source initiative, licensed under Creative Commons Attribution-NonCommercial 4.0 International (cc-by-nc-4.0 [Archive.org]). See the license at the end of the document. • For mirrors see Appendix A6: Mirrors • For help in comparing versions see Appendix A7: Comparing versions Feel free to submit issues using GitHub Issues at: https://github.com/AnonymousPlanet/thgtoa/issues Feel free to come to discuss ideas at: • GitHub Discussions: https://github.com/AnonymousPlanet/thgtoa/discussions • Matrix/Element: ```#anonymity:matrix.org``` https://matrix.to/#/#anonymity:matrix.org Follow me on: • Twitter at https://twitter.com/AnonyPla [Nitter] (cannot guarantee this account will stay up for long tho) • Mastodon at https://mastodon.social/@anonypla. To contact me, see the updated information on the website or send an e-mail to [email protected] Please consider donating if you enjoy the project and want to support the hosting fees (for the Tor hosting and the Tor Exit node). There are several ways you could read this guide: • You want to understand the current state of online privacy and anonymity not necessarily get too technical about it: Just read the Introduction, Requirements, Understanding some basics of how some information can lead back to you and how to mitigate those, and A final editorial note sections.
    [Show full text]
  • Phone, Tablet, and Computer Backup
    Joshua Pack's Blog | The Forum | Hightek Designs | Donate If you need an account, go to the forum and ask for it. Phone, Tablet, and Computer Backup This is a setup you can do to allow for backing up all your devices into one location. Your total setup cost will vary, depending on if you already have most of the hardware. Software will only cost $60/year for off-site secure backup. An optional one time fee (of $120) for Plex, if you decide to use plex. Syncthing is free and open sourced! Software Used Syncthing BackBlaze Plex (optional) Plex is optional. I use this to view all photos from all devices on any device, such as phones, tablets, and even on the Roku! However, you do not have to use this for backing up all your data. Hardware Used Hard Drive - Recommend running in RAID10, but is optional You can usually find a 14TB external hard drive for around $180. Computer - I use Windows, however, I am sure you can use Linux or even a Mac Syncthing Setup Synthing on Server You will need to first setup Syncthing on your computer that will be handling the backups. In my case, I use a Windows computer with an external hard drive. Install the latest version of SyncTrayzor from Releases · canton7/SyncTrayzor (github.com), make sure to run the 64-bit version. You can use this direct link, but it could be an old version: SyncTrayzorSetup-x64.exe Once setup, you shouldn't need to open up a port, since Syncthing will automatically find connections locally and remotely! I would just delete the default Folder provided.
    [Show full text]
  • REMOTE MOBILE SCREEN (RMS): an APPROACH for SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected]
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Computer Science and Engineering, Department of Dissertations, and Student Research Spring 4-2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/computerscidiss Part of the Digital Communications and Networking Commons, and the Hardware Systems Commons Gimenez Ocano, Santiago Manuel, "REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS" (2015). Computer Science and Engineering: Theses, Dissertations, and Student Research. 86. http://digitalcommons.unl.edu/computerscidiss/86 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Computer Science and Engineering: Theses, Dissertations, and Student Research by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS by Santiago Gimenez Ocano A THESIS Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Science Major: Computer Science Under the Supervision of Professor Byrav Ramamurthy Lincoln, Nebraska April, 2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Gimenez Ocano, M.S. University of Nebraska, 2015 Adviser: Byrav Ramamurthy Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices.
    [Show full text]
  • Studying TLS Usage in Android Apps
    Studying TLS Usage in Android Apps Abbas Razaghpanah Arian Akhavan Niaki Narseo Vallina-Rodriguez Stony Brook University Stony Brook University IMDEA Networks / ICSI [email protected] [email protected] [email protected] Srikanth Sundaresan Johanna Amann Phillipa Gill Princeton University ICSI U. Massachusetts ś Amherst [email protected] [email protected] [email protected] ABSTRACT ACM Reference Format: Transport Layer Security (TLS), has become the de-facto standard Abbas Razaghpanah, Arian Akhavan Niaki, Narseo Vallina-Rodriguez, for secure Internet communication. When used correctly, it pro- Srikanth Sundaresan, Johanna Amann, and Phillipa Gill. 2017. Studying TLS Usage in Android Apps. In Proceedings of CoNEXT ’17. ACM, New York, NY, vides secure data transfer, but used incorrectly, it can leave users USA, 13 pages. https://doi.org/10.1145/3143361.3143400 vulnerable to attacks while giving them a false sense of security. Numerous efforts have studied the adoption of TLS (and itspre- decessor, SSL) and its use in the desktop ecosystem, attacks, and 1 INTRODUCTION vulnerabilities in both desktop clients and servers. However, there With users entrusting increasingly sensitive data to their mobile is a dearth of knowledge of how TLS is used in mobile platforms. In devices, there has been a push for deployment of secure communica- this paper we use data collected by Lumen, a mobile measurement tion protocols. Transport Layer Security (TLS) and its predecessor, platform, to analyze how 7,258 Android apps use TLS in the wild. Secure Socket Layer (SSL) are the most widely used protocols to en- We analyze and fingerprint handshake messages to characterize the crypt network communication, with Google observing an increase TLS APIs and libraries that apps use, and also evaluate weaknesses.
    [Show full text]
  • Security Now! #734 - 10-01-19 the Joy of Sync
    Security Now! #734 - 10-01-19 The Joy of Sync This week on Security Now! With this week's "Joy of Sync" podcast we focus upon the latest state-of-the-art secure solutions for cross-device, cross-location device synchronization. But before we delve into that abyss... we'll update on Mozilla's recently announced plans to gradually and carefully bring DNS-over-HTTPS to all Firefox users in the US. It turns out it's not quite the slam-dunk that we might imagine. We'll also check-in with the EFF to see what they think, and remind our listeners about the 100% free VPN offering coming from our friends at Cloudflare. Security News Mozilla moves CAUTIOUSLY forward on DoH Mozilla plans to gradually enable DNS-over-HTTPS for its US users. Overall, DoH tests have gone well so far. So Mozilla will start rolling out DoH to a small set of US users, then gradually roll it out for more users. However, DNS is tricky to mess with, because it is used for more than only looking up public domains. It is used as a means of filtering and also as a means of providing access to local non-public resources. On September 6th, Selena Deckelmann, Mozilla's Senior Director of Firefox Engineering, posted some very interesting details that I know our listeners will find fascinating... https://blog.mozilla.org/futurereleases/2019/09/06/whats-next-in-making-dns-over-https-the-d efault/ Title: “What’s next in making Encrypted DNS-over-HTTPS the Default” ​ ​ In 2017, Mozilla began working on the DNS-over-HTTPS (DoH) protocol, and since June 2018 we’ve been running experiments in Firefox to ensure the performance and user experience are great.
    [Show full text]
  • Cloudturbine Security White Paper Matt Miller, Cycronix, 2/28/2018
    CloudTurbine Security White Paper Matt Miller, Cycronix, 2/28/2018 CloudTurbine Security White Paper CloudTurbine provides unique opportunities for secure data streaming between computers over local and wide area networks. CloudTurbine leverages data security provided by file storage and networking layers with which it interoperates. CloudTurbine i s not a server nor an application per se, but a collection of modules that utilize CloudTurbine technology for storing and/or reading streaming data. Thus, CloudTurbine data security is best thought of as a system-integration issue. By design, CloudTurbine writes and reads data only on the same local computer system upon which it operates. In this sense, the first layer of CloudTurbine data security is the same as local file system security. CloudTurbine enables streaming data via simple, regular files that in turn may be shared over networks. As such, the second layer of CloudTurbine data security is the same as that provided by your choice of file-sharing system network security. Figure 1 illustrates the multi-layered security options to be considered for a CloudTurbine deployment. Note that as CloudTurbine utilizes files and file sharing as the medium and mechanism for data transport, it also utilizes and benefits from the associated file-related security infrastructure. Figure 1: CloudTurbine Security Layers From Figure 1, each layer has its unique features and opportunities for keeping a CloudTurbine deployment secure: A) Local Area Network (LAN), data kept inside secure local area network. Optional data encryption at source. 1 CloudTurbine Security White Paper Matt Miller, Cycronix, 2/28/2018 B) Firewalls secure each site including connection authorization and authentication.
    [Show full text]
  • WINDOWS* Verschlafe
    Willkommen Erstis! +++ „Das neue Semester wird bestimmt besser” - verwirrter Student +++ Skandal: Dreck am Boden der Tasse *WINDOWS* verschlafe www.visionen.ethz.ch September 2017 Dirty Magazin des Vereins der Informatik Stu die r enden an der ETH Zürich (VIS) Open Systems gehört mit seinen Mission Control Security Services im Bereich IT- Sicherheit zu den europaweit anerkannten Anbietern. Wir arbeiten von Zürich und Sydney aus in einem dynamischen Umfeld in über 180 Ländern. Bei uns kannst Du Dein Wissen in einem jungen Team in die Praxis umsetzen und rasch Verantwortung übernehmen. Infos über Einstiegs- und Karrieremöglichkeiten sowie Videos findest Du auf unserer Website. www.open.ch 3 Editorial Liebe Leserinnen und Leser Ich hoffe, eure Prüfungen sind gut gegangen. Während ich diese Zeilen schreibe, liegt die Prüfungs- session allerdings noch in gefühlt weiter Ferne. Dass das vermeintlich Ferne in der Realität allerdings auch bedeutend näherliegen kann, erfuhr Zeno mit dem Fahrrad. Liest man seinen Reisebericht, scheinen Passfahrten von Graubünden nach Italien ein Zuckerschlecken. Umso befriedigter und er- holter, stelle ich mir vor, kommt man nach einer solchen Tour aus den Ferien zurück. Da dies die erste Ausgabe des Herbstsemesters ist, möchte ich natürlich alle Erstis herzlich willkom- men heissen. In dieser Ausgabe geben wir euch viele nützliche Tipps an die Hand und besonders wichtig, einen Steckdosenplan für die Hörsäle, in denen ihr eure ETH-Karriere beginnen werdet. Ihr merkt früh genug warum. Hier möchte ich euch auch auf den VIS aufmerksam machen, der beste Studentenverein der ETH (und der Welt?). Der VIS hilft in allen Lebenslagen, sei es mit gratis Kaffee am Morgen oder wenn eine Vorlesung mal nicht so der Brüller ist.
    [Show full text]
  • Forensic Analysis and Remote Evidence Recovery from Syncthing: an Open Source Decentralised File Synchronisation Utility
    Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility Conor Quinn, Mark Scanlon, Jason Farina, and M-Tahar Kechadi School of Computer Science, University College Dublin, Dublin 4, Ireland. {mark:scanlon;tahar:kechadi}@ucd:ie;{conor:quinn;jason:farina}@ucdconnect:ie Abstract. Key words: Syncthing, Digital Forensics, Remote Foren- sics, Network Analysis, Evidence Recovery 1 Introduction In an ever increasing mobile and connected world, the demand for end users to access their data on the go using multiple platforms and devices is higher than ever. While numerous platforms have been developed to respond to this constant information need, these platforms can give rise to data protection and privacy concerns. These concerns primarily lie with cloud-based file synchroni- sation services such as Dropbox, OneDrive and Google Drive. A number of these services have been leaked as sharing replicated information with government se- curity and spying agencies without first requiring the issue of a warrant [1]. The desire for privacy has led to a rise in cloudless file synchronisation services such as BitTorrent Sync (BTSync), Syncthing and OnionShare. One of the most popular decentralised file synchronisation services is cur- rently BTSync, which as of August 2014 had over 10 million user installs [2]. However a significant number of these users are not comfortable with the pro- prietary nature of the application and its handling of their data. This has moti- vated a transparent alternative being developed, called Syncthing. Syncthing is an open source, cloudless file synchronisation service. Users have the ability to identify how the software finds other active nodes to sync with, transfers data from node to node, and synchronises information between different devices.
    [Show full text]