I seem to recall several people saying that the compression/encryption plugins 
will only encrypt items, and not the filesystems metadata. And then saying 
that this might be useless for their purposes, because being able to see the 
filename might be enough for the attacker.

However, I don't think that is correct. The only thing visible to an attacker 
would be the tree structure, not the item, which contains the directory 
information including the filenames.

So at most an attacker would be able to browse the tree structure, and see the 
keys used and the size of the item pointed to. If this is true, selection of 
a good hash should entirely prevent the giving information away problem, 
leaving only useless key->size->location data for an attacker.

Is my understanding correct?

Reply via email to