Qingbing Ji1,2,*, Zhihong Rao1,2, Lvlin Ni2, Wei Zhao2, Jing Fu3
CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 817-829, 2022, DOI:10.32604/cmc.2022.026949
- 18 May 2022
Abstract MEGA is an end-to-end encrypted cloud storage platform controlled by users. Moreover, the communication between MEGA client and server is carried out under the protection of Transport Layer Security (TLS) encryption, it is difficult to intercept the key data packets in the process of MEGA registration, login, file data upload, and download. These characteristics of MEGA have brought great difficulties to its forensics. This paper presents a method to attack MEGA to provide an effective method for MEGA’s forensics. By debugging the open-source code of MEGA and analyzing the security white paper published, this paper More >