Snapchat Hacking Scandal: Reasons Local Storage Security Is Better Versus Cloud-Based Service
Cloud storage service is an amazing innovation, which allows social sites such as Snapchat to upload, store and share images and videos online. However, local storage is easier to secure using different apps and security policies.
Snapchat Hacking Vulnerability
Security of the third party application of Snapchat has been breached by hackers which exposed over 100,000 private images and videos online. These images and videos are stored in cloud storage service provided by Snapchat developers meant to be sent only to a controlled list of recipient as intended by the social service client.
But this is not the first time Snapchat has been hacked by intruders. Several reports have been recorded about the past security vulnerabilities of the social service client from various exploitation.
1. In Dec. 2013, Snapchat was hacked and revealed an approximate of 4.6 million usernames and phone numbers in a website called "SnapchatDB.info."
2. Australian security firm Gibson Security exploited the failure of Snapchat to fix API security vulnerability in Aug. 27 2013. Anonymous hackers attacked the vulnerability to raise public awareness and force the developers to fix the exploit.
Local Storage Edges Cloud Storage On Security
Both cloud and local storage have distinct features which made app and service developers utilise these two in most cases. Cloud storage service is virtually unaffected by computer crashes, it can be accessed anywhere using a modern device provided with an Internet connection and requires low maintenance unlike with local storage. Local storage on the other hand features a faster access than cloud storage, immune to cloud storage failure due to reserved physical copies and lower cost of local server requirements. If you have an external hard disk, how secure the files would be?
- Security can be maintained by IT personnel.
- Encryption codes can be used to increase security.
- Sharing can only be performed in limited number of ways such USB transfer.
- An intruder must gain access to the local storage device in order to hack it.
- Bribery or coercion rate to access data on a local storage is lower than with cases on cloud storage
- Recovery of files is only possible by using the local storage device
- Unlikely to be targeted by hackers due to its lower resource value
- Native or third party apps for security such as CM Security can protect locally stored apps and files on smartphones and tablets using passcodes