

Just click the “My Drive” button and select “Connect more apps.” Then, use the window that pops up to search or sort through available options.CloudConvert: quickly convert files from one type to another.WappWolf Automator: automate procedures like file transfers.Pixlr Editor: nice browser-based Photoshop clone.HelloFax: send and receive faxes from Google Drive.Other cloud services offer third-party integrations too, but none of them seem to make it as easy to discover and activate them as Google Drive does. In case you missed the news, Google has been at the center of user privacy controversy. Most of the contention arose after Edward Snowden revealed to the world that the NSA was secretly surveilling Internet communications.

In doing so, he also outed relationships between the NSA and several major tech corporations, like Microsoft and Google. Public outrage over the revelations greatly intensified the spotlight on online user privacy, especially within the cloud environment. Perhaps in part because of this increased attention, Google Drive finally started encrypting user content on their servers in August of 2013. That’s a good thing since data breaches are on the rise. However, it isn’t enough: for one, Google Drive still doesn’t encrypt user metadata. It was metadata - not content - that the NSA was collecting in the first place. Also, even though they now encrypt content, Google retains the keys to decrypt that content whenever they want. This fact allows them to scan your data to see what’s getting uploaded and hand over plain text copies of files to others. Moreover, rogue employees or even hackers could obtain and distribute those encryption keys, too. Such gaping security holes is why many cloud consumers are now looking to other services for added protection. One such service quickly becoming a favorite among security advocates is (see our most secure cloud storage roundup). What makes so secure? For starters, they keep data encrypted server-side, to mitigate any unauthorized access attempts.

Additionally, data traveling between your device and the data center gets protected with a secure SSL/TSL tunnel.
