By Jeb Boone
The security of Kim Dotcom's new cloud storage website Mega is being questioned, while it deals with technical problems since being launched on Sunday.
On Tuesday, Dotcom took to Twitter to apologise for the issues surrounding the site launch, mostly having to do with trying to accommodate so many new users at one time.
"The massive global PR around the #Mega launch is simply to[o] big to handle for our start-up. I apologize for poor service quality," Dotcom tweeted.
"We are making good progress. Adding servers & fixing bugs. It should not be long until you can enjoy #Mega without hiccups."
Mega offers users 50 gigabytes of free cloud storage and the ability to share files with other Mega users.
There are growing concerns, however, over the security of the site and the ability of users to protect themselves from malicious attacks.
There is no way to delete a Mega account, meaning that should an account be compromised by a hacker, there is no way to change the password or remove the account from the site.
Other concerns surround the site's encryption technology.
Because the key given to users to decrypt and encrypt files is held on Mega's own servers, a password must be entered to use Mega's encryption key. With no ability to change a password, losing it would mean losing access to all of a user's files.
Compounding problems with the site, enclaves within the Anonymous hacker collective have called for a boycott of all Mega services in light of Dotcom's co-operation with US authorities last year in the prosecution of NinjaVideo, a pirating site that often linked to Megavideo's streaming service.
"Kim Dotcom broke the pirate code. He is a snitch, and needs to be exposed to the world as such," wrote Anonymous in a statement on Tuesday.
Over a year before Dotcom indictment for copyright infringement, racketeering and money laundering over his former file-sharing website Megaupload, and the raid on his New Zealand mansion, Megaupload aided the US prosecution of NinjaVideo by consenting to the search of several of the company's servers based in Virginia.
In the search, user data of NinjaVideo operators were seized. That information led to the conviction and imprisonment of Hana Amal Beshara and Matthew David Howard Smith.