@duponin depends upon what level of privacy you are aiming for
@mur2501 this is mainly a private application, URL with link to S3 would not be publicly available
the only thing that goes to me is an enumeration bruteforce if the bucket URL leaks
the policy I used:
{ "Version": "2012-10-17", "Statement": [ { "Sid": "PublicRead", "Effect": "Allow", "Principal": "*", "Action": "s3:GetObject", "Resource": "arn:aws:s3:::BUCKET/*" } ] }
@duponin Maybe bruteforce yourself and see how much of a threat it ishttps://github.com/craighays/bucketkickerotherwise you can just keep the bucket private
QOTO: Question Others to Teach Ourselves An inclusive, Academic Freedom, instance All cultures welcome. Hate speech and harassment strictly forbidden.
I noticed s3cmd can sign a string, so maybe I can generate a temporary token that the client would use and regenerate
it would keep the bucket private with time-limited access