This "config.db" file is on the user's machine so how does an attacker get it ? If they have access to the machine, who the hell cares about Dropbox's security, or lack of ?This means that if you gain access to a person’s config.db file (or just the host_id), you gain complete access to the person’s Dropbox...
Hall said:It appears to me that this is a bit of an exaggeration...
This "config.db" file is on the user's machine so how does an attacker get it ? If they have access to the machine, who the hell cares about Dropbox's security, or lack of ?
Every piece of software and every operating system can be susceptible to this same security "issue".Agreed. I read that story and thought the same thing.