This "config.db" file is on the user's machine so how does an attacker get it ? If they have access to the machine, who the hell cares about Dropbox's security, or lack of ?
It appears to me that this is a bit of an exaggeration...
This "config.db" file is on the user's machine so how does an attacker get it ? If they have access to the machine, who the hell cares about Dropbox's security, or lack of ?