Abstract: Protecting content is disclosed. A request for a file system operation is intercepted. A user-defined callback that corresponds to the file system operation is identified. The user-defined callback that secures the file system operation is executed. The user-defined callback may be used for pre or post-processing of data, authentication, and/or other use cases.
Abstract: A request to store a file to be protected is received. It is detected whether the file to be protected is a file to be synchronized. The encryption key is selected based on the detection of whether the file is a file to be synchronized. The file to be protected is encrypted using the selected encryption key.