Abstract:
An apparatus may include a messaging server component operative to determine a sharing event for a data item, the sharing event associated with a source client device with a local storage of the data item. The apparatus may request that the source client device upload the data item to a destination storage device in response to a determination that network storage of the data item is scheduled for relocation from a source storage device to the destination storage device. The apparatus may include a storage management component operative to determine that the network storage of the data item is scheduled for relocation from a source storage device to a destination storage device and de-schedule the relocation of the data item.
Abstract:
Techniques to replicate data using uploads from messaging clients are described. In one embodiment, for example, an apparatus may comprise a messaging server component operative to determine a sharing event for a data item, the sharing event associated with a source client device with a local storage of the data item, and request the source client device upload the data item in response to a determination that network storage of the data item is scheduled for relocation; and a storage management component operative to determine that the network storage of the data item is scheduled for relocation from a source storage and de-schedule the relocation of the data item from the source storage device.
Abstract:
Techniques for media endpoint configuration are described. In one embodiment, an apparatus may comprise a messaging server component operative to receive a media message addressed to a recipient user account, the media message comprising a media identifier for a media item; and send the media message to a recipient client device associated with the recipient user account; and a media management component operative to send a media endpoint list to a recipient client device, the media endpoint list operative to configure the recipient client device to retrieve the media item by identifying the media item with the media identifier to a media endpoint determined based on the media endpoint list. Other embodiments are described and claimed.
Abstract:
Exemplary embodiments relate to techniques for anonymizing information in an end-to-end (E2E) encrypted environment; the information may include, for example, statistical data about unique page/message views, view counts, view time, what users selected on the message or page, etc. Exemplary embodiments may prevent an E2E system server from being able to identify which user is associated with which record. Various examples are described, including an embodiment in which an originating client generates the data, encrypts it, and sends it to a random contact. The contact decrypts the data, re-encyrpts it, and sends it to another random contact. The procedure continues for a set amount of time or for a set number of hops. Other embodiments relate to wrapping the data in various layers of encryption and sending the data to clients in a chain. The encrypted layers prevent clients along the chain from being able to view the anonymized data.
Abstract:
Exemplary embodiments relate to techniques for anonymizing information in an end-to-end (E2E) encrypted environment; the information may include, for example, statistical data about unique page/message views, view counts, view time, what users selected on the message or page, etc. Exemplary embodiments may prevent an E2E system server from being able to identify which user is associated with which record. Various examples are described, including an embodiment in which an originating client generates the data, encrypts it, and sends it to a random contact. The contact decrypts the data, re-encrypts it, and sends it to another random contact. The procedure continues for a set amount of time or for a set number of hops. Other embodiments relate to wrapping the data in various layers of encryption and sending the data to clients in a chain. The encrypted layers prevent clients along the chain from being able to view the anonymized data.