Privacy [better]: Filecatalyst

Strong for operational privacy (low metadata leakage), but requires careful cipher suite configuration to avoid classic TLS privacy flaws.

Because it prioritizes speed, default deployments often use AES-128-CBC (not AES-256-GCM) for data-at-rest, and some legacy setups rely on FTPS (TLS 1.2) rather than the more private SFTP or SCP. The privacy risk? TLS 1.2 with CBC mode can leak metadata through padding oracle vulnerabilities if not patched. filecatalyst privacy

Unlike cloud sync tools (Dropbox/Google Drive) or basic FTP, FileCatalyst’s proprietary UDP-based protocol can be configured so that intermediate nodes or logging systems only see packet timing and volume—not file names, directory structures, or sender/recipient details beyond IP addresses. This makes it attractive for healthcare (DICOM transfers) and legal (discovery) where file existence is as sensitive as content. Strong for operational privacy (low metadata leakage), but