Aside from probably being a good idea to look at a local alternative which I saw mentioned on here to day or yesterday, I am curious, is this something we need to be concerned about?<p>http://www.magnetforensics.com/decrypting-the-dropbox-filecache-dbx-file-new-free-tool/<p>I was looking to find out what the files were, why they are so large, do they need to be backed up, etc. And then, ran into a way to decrypt them.<p>Suggestions and opinions?
That isn't a security issue.<p>If you have access to the encrypted DropBox cache you likely also have access to the raw files themselves (via both DropBox and the File System) and also have the meta data stored elsewhere (e.g. filesystem, backups, restore points, et al).<p>The fact that DropBox even encrypts that is "cute." The fact they encrypt it using the LSASS makes it almost worth while (almost). But realistically there are very few scenarios outside of computer forensics where this kind of thing is useful to someone.<p>The reason it is useful to them is: They may not have a warrant for your DropBox (but do have your computer in their possession). The files are deleted locally but on DropBox, so they can leverage the cache to get a warrant for DropBox.<p>As a note tons of other stuff caches meta data within unencrypted SQLite databases such as Skype, Chrome, Firefox, Thunderbird, et al. It isn't a security issue there either as your user is meant to have access to this (just as with DropBox).