capi

Members
  • Posts

    70
  • Joined

  • Last visited

  • Days Won

    1

Posts posted by capi

  1. So more nodes you have = more probability to lose your data :(

     

    More correctly: the more RW nodes you have. If you stick to RO nodes for backup, this won't be a problem.

     

    Bit-rot is a problem that needs to be addressed at several levels, unfortunately (but understandably), most filesystems ignore this issue and shift it to hardware, which often also skips checksum checks due to performance issues.

  2. You can't because they have the key after the approval process. You can switch the secret on any other peer, but this might not be what you want.

     

    I think that there is a lot misunderstanding/misconception of what the peer approval is doing: it's not an access list, it just protects the exchange of the RW or RO-secret. Once a peer knows the secret, it can share it and anyone who directly enters a secret doesn't go through the approval process.

  3. Yes, this is the intended backup functionality. If you want it otherwise, you can use the read-only secret of a share on the server.

     

    If a file changes on the mobile phone, it is also changed on the server, the old version going to the SyncArchive folder, where it is kept for how long you configured SyncArchive to be kept.

  4. While the resizing columns on Windows 7 with IE works now, connecting to a Linux box with Firefox now cannot resize columns at all for me.

     

    When connecting to the Linux box with IE, resizing of the columns works, so this seems to be a incompatibility with Firefox. Google Chrome works, though.

     

    Best regards & thanks for all your efforts,

    Martin

  5. From my understanding it is this way:

     

    The certificate and approval only kick in when you use the new link sharing feature, which replaces the old "one-time secrets". It is only used to secure the exchange of the main secret. Once the secret is shared, there is no more approval of the peers required.

     

    This is based on the fact, that if you enter a secret directly, no approval is required.

     

    So I assume, that only one peer needs to approve and once the secret has been exchanged the peer will communicate with all the other peers without further approval.

  6. We will have more official info about this soon. This info will work better than my words :)

     

    I hope this means what it implies it means :) Looking forward to this "official info" very much :) Thanks for your hard work!

     

    And basically you confirmed what I tried to write in my answer. No data leakage but some potential troubles with the tracker / relay, but as you said, there are other means of peer discovery.

  7. I just posted the following discussion to this blog entry, and I think it is also a valid repsonse here, but I am really looking forward to some official answer:

     

    The question is, how far this really leads to exposure of data. The claim is, that tracker and relay only ever see encrypted content (hash of secrets for the tracker, encrypted data for the relay). So if this claim is true (and this can neither be verified nor rejected based on the information here), the attack scenario is, that someone could do a DoS on sync, i.e. prevent peer discovery via tracker to fail by forcing an invalid tracker, but could not extract any shared data.

  8. Still not clear enough for me :-) BTW, my question is for Android. Doesn't Sync have a service that runs in background all the time watching for changes in the folder selected for backup?

     

    At the moment, there is no background service, the application is only running when you see the notification icon is shown in the notification area. And I like it that way :)

  9. As soon as I installed Bittorrent Sync 1.8.2 my HP OfficeJet 6310 crashed with a "Reset Power" error message. This HP forum post suggested disabling uPNP on the printer, which solved the issue. It is notable that I was running Bittorrent Sync 1.8.2 on both my laptop and media center PC (both running Ubuntu) and didn't have this issue.

     

    There are some UPnP implementations that are buggy. You can also disable UPnP in btsync, should fix the issue also.

  10. RomanZ,

     

    you lose data, if no checkpoint occured, as data has then not yet been written back to database. If you delete it during checkpointing or the PC/app crashed while performing a checkpoint, you still need the WAL to recover/repair the data file. So no, it is not safe to remove the WAL file ever, unless sqlite removes it itself (which it does, when the last connection to the database is closed, as you mentioned). If the file still exists, the shutdown was not clean and the WAL will be required on next connection to the database.

     

    It is a temporary file in the sense that it will be removed once everything is fine and applied, but it is not temp in the sense that you should/could remove it on will.

     

    I have done my fair share of development with SQLite, and used WAL-mode a lot as it is a huge performance improvement in case of multiple writers and the advantage that a writer transaction won't block reader transactions.