The Heartbleed OpenSSL bug has left the cloud hemorrhaging sensitive data. By utilizing the bug an exclusive group of elite hackers (possibly both private and government funded) have had access to all data stored on service that relied solely on OpenSSL for security.
The two biggest file sharing players Box and Dropbox have openly stated that they have exposed all their users’ data to the Heartbleed bug. This means that the hackers have had full access to stored data, as they have been able to access the credentials. The Heartbleed troubles should be stacked upon the Snowden revelations, these two issues should leave anyone serious about security to highly question using pure SSL as a sole mean of file sharing security.
The truly scary part of the Heartbleed bug is that there very possibly already is lurking new massive coronary in the OpenSSL code. The project is core to the security in Box and Dropbox (and many other twin services) and the code base is too vast and complex to ensure that there are no further massive bugs in it.
The solution is to stop relying on SSL for file sharing security. It does not matter that your service provider encrypts your data once it reaches the cloud if it travels there fully exposed (or if they expose your encryption keys). ShieldShare from BlockMaster uses clientside encryption, separate key management and fully encrypted cloud storage handling. This means that your data is locked down securely locally before ever being sent into the cloud, meaning that the transfer protocol is only cosmetic.
Try out the ShieldShare secure file sharing infrastructure today: