Comment Re:You wanted privacy? (Score 1) 243
If this is what is going on in the background are they are using hashing to identify the files? What is the risk of a hash collision? Would this be a legitimate concern using the service?
"May your future be limited only by your dreams." -- Christa McAuliffe