Susceptibility of 7z encrypted archive files to man in the middle attacks

Given:

A file (assume 1 GB in size) is encrypted along with filenames using 7zip into a 7z archive using AES-256
The file is uploaded to a cloud storage service such as those offered by Google, Amazon, or Microsoft
The file… Continue reading Susceptibility of 7z encrypted archive files to man in the middle attacks