No, and I didn’t say that. But it is very interesting to learn, where Lastpass data is/was stored. In the past I had already suggested, to target those password managers as customers:
I still think it would be a nice fit.
But as always, there is a lot to learn from such an attack. For example it has now been mentioned, what 3rd party software was exploited:
According to a person briefed on a private report from LastPass who spoke on the condition of anonymity, the media software package that was exploited on the employee’s home computer was Plex.
This makes me remember the blog article on Storj: Use the Decentralized Cloud to Transform Your Multimedia Library Into Your Personal Netflix
But there is more:
The article mentions the logging capabilities that made it possible to detect anomalous behavior. I don’t know how that works on AWS but of course I am asking myself if something similar exists for Storj DCS.
And maybe such an incident is also a good time to ask how well the Storj satellites are secured against such an attack? It seems that an attacker could cause a lot of harm, if he gains unauthorized access to the satellites. And the question how well they are protected and secured against a similar attack, might be even something potential customers would ask themselves, before putting data on Storj DCS.
So there is a lot around this Lastpass incident, that can be interesting for Storj as well.