Comment Re:You wanted privacy? (Score 1) 243
If this is what is going on in the background are they are using hashing to identify the files? What is the risk of a hash collision? Would this be a legitimate concern using the service?
If you have a procedure with 10 parameters, you probably missed some.