They claim it's only if you use their AI tools, and they claim OpenAI will use your data for only 30 days and then delete it. I think that's a terrible abuse of user rights and a security disaster waiting to happen.
Confusingly, they've rolled-out this malfeature to some users but not all (yet). My partner & me compared the "Settings" page on our Dropbox accounts — the "Third-Party AI" tab is there for one of us but not the other.
The setting is switched on by default. This is a "dark pattern" (also known as a "deceptive design pattern") that ignores user consent. If you don't know about it, you can't opt-out. Worryingly, if you're slow to opt-out then there's a chance they've scraped you data already. It's a harsh reminder of the saying "If you're not paying for the product, you are the product".
If you use #Dropbox there are two toggles that you have to check/toggle in order to avoid your private data being sold or being used to train AI models:
On the Desktop website:
Go to Help and then Cookies & CCPA preferences to enable "do not sell or share my information" (thanks @PixelProphecy)
Next, go to Settings -> Third Party AI, to disable sharing your data for AI training.
#Police in Plymouth Township, #Michigan are investigating whether a lighting system that was set up by a mystery person to flash when someone approached a #ballot#DropBox was an attempt to #intimidate#voters.
James Knittel, the Twsp chief of the #police, said in the weeks before #Michigan's Feb 27 presidential #primary, the mystery person installed a fake camera on a pole near the drop box & a device that was similar to a motion detector.
Knittel said it appeared the person intended for the device to flash when someone walked up to the #ballot#DropBox "as if it was taking a picture.”
Super weird to me that Dropbox has told Dropbox Sign customers to "delete your existing entry and then reset it" if they use app-based MFA. I have never seen "delete your MFA and create new tokens" in post-compromise account hygiene advice before.
I suspect two things:
1.) Dropbox was storing plain text MFA seeds right next to their password hashes
2.) We're going to hear a lot more about this soon.
Possibly a foolish question for the Mastodon mind, but with #Dropbox now willing to trawl my data for #AI purposes, is the concept of an invasive-free cloud drive impossible? Or should I stop worrying and learn to love #rsync over #ssh again?
Manual setup was a bit of a pain (they want you to use docker, of course) but well worth it! It does all the collaborative google drive-y things I need it to.
Yesterday, someone on my timeline posted a #Dropbox link to some "high-quality" audio in a WAV file but with downloading disabled, meaning that it could only be played via the app or website. Dropbox doesn't make it obvious that in such a scenario, the content is re-encoded to AAC LC for streaming, in bitrates ranging from 128kbps to 320kbps. Perfectly acceptable audio quality for most things, but it does negate the point of linking to the large WAV file in the first place.
Dropbox Users. If you have Dropbox and have 2 factor turned on, just a warning, if you ever lose access to the email that is associated with Dropbox, then you could lose all access to your files. The reason is because Dropbox uses your email to send you the 2 factor code to enter. This has happened to my friend. Dropbox does set up 10 emergency 2 factor codes that will always work that you can write down and keep. The thing is that most people do not know about these codes. To access and write down your codes, go to the Dropbox website and log in, go to settings, then go to security. In there you will find your personal 2 factor codes that you can use each one one time in case of an emergency. And please do not store these codes in your Dropbox, because if you can not access your Dropbox, then you will not be able to access these codes! Store them somewhere safe outside of Dropbox so you can easily access them if needed. #Dropbox#TwoFactor#Codes#Website#security
Cloud storage company #Dropbox reported that a hacker breached company systems on April 24 and gained access to sensitive information like passwords and more.
vi ricordiamo che da 1 anno tutti gli utenti di #MastodonUno possono fare richiesta di un account Nextcloud da 25GB per poter conservare e condividere file senza le limitazioni presenti su mastodon.
Nextcloud è un progetto open source e permette di importare automaticamente tutti i file dall'account #dropbox.
Questo è il modulo di richiesta per ricevere i dati di accesso:
If you use Dropbox you should probably change your password.
Headline: #Dropbox Hacked! Threat Actor Accessed Passwords and Phone Numbers
Snippet: A quick analysis revealed that a threat actor had broken in to access customer information such as emails, usernames, phone numbers and hashed passwords, as well as general account settings and certain authentication information (API keys, OAuth tokens, and multi-factor authentication).
In particular WHY that particular method? need cross device/platform? 2 b available online? What (about this, or any method) are challenges to you? Do you struggle to organize your notes? What would you wish was better?
@alexjsp@Daojoan absolutely is. They haven't added features or spoken about it in a very, very long time. Quite surprising actually that they haven't looked to this new AI content era as an excuse to bring some focus back to Paper.
I do wonder why they didn't try harder to compete. Launching a #Dropbox email service to go with Paper and the core Dropbox product would've made it a pretty appealing prospect for people wanting out of #Google and #Microsoft.