Hi,
Did not change a thing. Direct access is still feasible !
http://dev.footage2go.com/filestore/1/4/3/5_f8f5313a46f40ee/1435_alt_107_c71be698684e7d6.mp4This is something big, as serious customers will need protected filestore.
I meant, due to the persistent nature of the medias in RS platform, it will be feasible for one to grab the files.
There is a clear heuristic as where the resource ID is used as the path, with last digit followed by an underscore then a string of 15 hex characters (15^16 possibilities), followed by the resource ID, underscore, 'alt' string, a number and another scramble key.
I KNOW there is ways a sysadmin could prevent on to brute-force a resource, but I would prefer a software solution that has the filestore outside his web folder.
This is a risk with a small
likelyhood, but serious clients, like the banking industry, will reject a solution than exposes the filestore like that.