As a result of this and a number of other confidential issues I don't trust Mega anymore. I don't think your data is safe on Mega anymore.
If his implementation of Mega was dependent on the 'trustworthiness' of the operators, then it was never truly encrypted. Nor should we expect his next iteration of cloud filesharing to be fully encrypted.
What are all those scientists, engineers and business experts at a huge multinational corporation thinking?
Probably they're thinking, "I really like this paycheck. The product we're developing has no chance of gaining traction in the marketplace, but that's my boss' fault for coming up with this idea in the first place."
Do you really think those people are going to argue with management that they shouldn't have a job developing this concept?
They are to explain the reasoning behind the code.
This is a huge purpose for comments. Also, maybe I can interpret the code perfectly well without comments. How well can I depend on everyone else who is modifying the code to be able to interpret it properly.
Well-documented code helps protect it from the introduction of bugs by later contributors.
anything else i can do?
Modify SSHD config to listen on non-standard port. It will greatly diminish the log traffic you'll see of failed attempts. This could be important if you're using fail2ban as well and don't want your iptables to bloat unreasonably.
Stay away from configuring port-knocking. It becomes a real pita when you want to scp a file at the spur of the moment.
You're talking about a profession that in many cases has either no training or dubious training.
This is a field that requires a masters degree and certification.
You're probably thinking of faith-based social organizations that attempt to provide counseling services. Those agencies do not provide effective treatment for the ailments you mentioned. At best they might be able to provide some marriage counseling assistance.
...to see who else might be a solid villain candidate. Even just monitoring internet traffic to known jihadist websites can likely get the filters applied to a person's communications to see if they might be a person-of-interest.
That type of work is more than forensics. It's proactively chasing up the networks to make their leadership accountable. Those are vague terms for drone strike.
I'm not cheerleading the NSA here, either. Just commenting on the data science.
New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman