this post was submitted on 23 Jan 2024
257 points (93.3% liked)

Technology

60071 readers
3365 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 2 years ago
MODERATORS
top 50 comments
sorted by: hot top controversial new old
[–] [email protected] 203 points 11 months ago* (last edited 11 months ago) (29 children)

I have a solution:

governments should heavily fine companies that are subject to data breaches.

If it cost them real money (proportional to their market cap, the amount of customers affected, and/or the severity of the breach) to allow a data breach, I’m betting they’d shore up those holes REALLLLLLLLLL QUICK.

[–] [email protected] 108 points 11 months ago (3 children)

This is always the answer. "How do we solve x in y industry?" Make the fucking corpos responsible for their own asses and it will get fixed. If it costs them more money to be breached they will do everything they can to not allow that.

[–] [email protected] 36 points 11 months ago (1 children)

That, or threaten to nationalize their industry. Corporations *hate * that.

[–] [email protected] 29 points 11 months ago (2 children)

Communications should always be nationalized. It was a mistake letting corporations gatekeep phones and internet.

[–] [email protected] 20 points 11 months ago* (last edited 11 months ago) (1 children)

Infastructure should be nationalized as a whole (roads, rails, water, heating, electricity, waste disposal and so on)

[–] [email protected] 7 points 11 months ago (1 children)
load more comments (1 replies)
load more comments (1 replies)
[–] [email protected] 11 points 11 months ago

“Externalities” are just expenses that corporations incur that have to be paid by the public.

Make externalities losses again.

[–] [email protected] 3 points 11 months ago (1 children)

It'll also screw over anyone trying to break into the market, ensuring that the big tech companies remain unchallenged indefinitely.

[–] [email protected] 8 points 11 months ago (2 children)

Disagree if you add the three different factors that I added to account for this in my original comment:

As I wrote in my edit, I think the size of fine should be dependent on:

  • size of company

  • the reasonable expectation of security (which would partially attempt to decrease fines for unfixable breaches)

  • the number of unique users affected

load more comments (2 replies)
[–] [email protected] 28 points 11 months ago (1 children)

They're too busy proposing legislation to create back doors that completely circumvent security in the first place.

[–] [email protected] 8 points 11 months ago

Yeah, people shouldn't look to their government to protect them from this. Hell, I'd be willing to bet no small amount of taxes go to purchasing the leaked info at places like the CIA, NSA, and FBI.

[–] [email protected] 18 points 11 months ago (4 children)

Nah, throw the board members in prison. If the punishment for crime is a fine then it's legal for rich people/corps. Put 'em in solitary and feed them nutraloaf for one day for each person's data they allowed to be leaked.

If they get all the money because they're ultimately responsible, we should make them ultimately responsible.

[–] [email protected] 8 points 11 months ago

if it means prison time for a middle/lower class person, it should mean prison time for everyone who is responsible for basically publishing logins and personal data.

no more geeting off scott free because you run a company. you're a prisoner like everyone else now.

load more comments (3 replies)
[–] [email protected] 17 points 11 months ago (1 children)

As much as I agree that something needs to be done to these companies, and that they deserve punishment, I think this approach would only result in leaks (even more) underreported, which makes it even worse.

[–] [email protected] 6 points 11 months ago (1 children)

Are these leaks even being reported by companies? Every article I have seen so far has just been compiling information off the new leaked data set someone picked up off the dark web or something.

load more comments (1 replies)
[–] [email protected] 11 points 11 months ago* (last edited 11 months ago) (3 children)

Article 82, paragraph 1 of the GDPR:

Any person who has suffered material or non-material damage as a result of an infringement of this Regulation shall have the right to receive compensation from the controller or processor for the damage suffered.

Paragraph 2:

Any controller involved in processing shall be liable for the damage caused by processing which infringes this Regulation

Article 24, paragraph 1:

**[T]he controller shall **implement appropriate technical and organisational measures to ensure and to be able to demonstrate that processing is performed in accordance with this Regulation.

Article 5, paragraph 1f:

Personal data shall be: […] processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss,

Article 83, paragraphs 2 and 5:

Each supervisory authority shall ensure that the imposition of administrative fines pursuant to this Article in respect of infringements of this Regulation referred to in paragraphs 4, 5 and 6 shall in each individual case be effective, proportionate and dissuasive.

Infringements of the following provisions shall, in accordance with paragraph 2, be subject to administrative fines up to 20 000 000 EUR, or in the case of an undertaking, up to 4 % of the total worldwide annual turnover of the preceding financial year, whichever is higher:

(a) the basic principles for processing, including conditions for consent, pursuant to Articles 5, 6, 7 and 9;

Article 4, paragraph 7:

‘controller’ means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data

(All quotes are excepts, emphasis mine

https://gdpr-info.eu/

[–] [email protected] 3 points 11 months ago* (last edited 11 months ago)

I think we can both guess why these companies never really face penalties that hurt them materially despite this being codified into law in the EU…

load more comments (2 replies)
[–] [email protected] 5 points 11 months ago (1 children)

They won't because fines are just a fee to allow them to run unethically. That way businesses get more profit than they would otherwise and government gets their cut to allow it. It's broken by design.

[–] [email protected] 9 points 11 months ago

The EU has proven time and again that fines can hurt.

load more comments (23 replies)
[–] [email protected] 92 points 11 months ago (2 children)

Kind of worrying when their source is a “data breach information website” that does advertorials for “the most safe password manager” NordPass. 🤮 The internet of today has become a pile of absolute shit.

[–] [email protected] 20 points 11 months ago (4 children)

We should make a new internet in the dark web, but only invite cool people. No billionaires, narcs nor finks allowed !

[–] [email protected] 17 points 11 months ago (3 children)

No narcs or finks? What about patsies or stoolies? Can we at least have phonies?

[–] [email protected] 11 points 11 months ago (2 children)

I’ll give you one chump and half a busta, but that’s all you’re getting!

load more comments (2 replies)
load more comments (2 replies)
load more comments (2 replies)
[–] [email protected] 50 points 11 months ago (6 children)

I think it's gotten to the point that we. (Collective) Have to start using alias. I know proton for a price gives fake mobile and email address.

I have started using a 5th email to sign up to things. Have an extra number as well. It's beyond a joke really.

Tried to sign up for a budget app and it requires email phone and address.

No. No you don't require any of that. You want that to sell. And you've likely got inadequate protection.

Nobody but my bank job and maybe a few places require all my info.

[–] [email protected] 4 points 11 months ago* (last edited 11 months ago) (6 children)

Oh proton gives mobile too... Ya know I didn't feel like paying for the mail thing as I can have my domain and relay easily but the mobile thing I didn't know.

But I will be honest I didn't see it mentioned on the web, it's already a thing?

[–] [email protected] 3 points 11 months ago

They only generate email addresses.

load more comments (5 replies)
load more comments (5 replies)
[–] [email protected] 36 points 11 months ago (2 children)

Not until a politician or billionaire is harmed by these breaches will we see some action.

[–] [email protected] 17 points 11 months ago

They’ll get justice, you’ll get a check in the mail for 3 dollars, after some lawyers win a class action lawsuit.

[–] [email protected] 8 points 11 months ago (1 children)

I don't think so.

Trump himself was victim of credential stuffing. And he's not the only politician or billionaire who has suffered stolen accounts of something.

load more comments (1 replies)
[–] [email protected] 25 points 11 months ago

That seems weird, it's called mother of all breaches, but isn't the result of any one breach. It's just data collection from ordinary breaches with perhaps some credential stuffing in the mix.

[–] [email protected] 24 points 11 months ago (7 children)

Definitely recommend a password vault to anyone that doesn't already use one. After this next hack leaks, I imagine you'll get at least a couple of attempts on your email/phone.

[–] [email protected] 8 points 11 months ago* (last edited 11 months ago)

I had an identity theft a few years back, still cleaning up from it. At the time I had the typical set of standard passwords that I would use. I thought they were ok since they were pretty random but I had one for Financial, one for Web Services, etc. so of course when the creds leaked, I suddenly had a bunch of credit card bills I never signed up for..

Since then, every password is unique, my default is 31 characters, and 2-factor for everything possible. Unfortunately I initially settled on LastPass, figured that they had hopefully learned their lesson from their breach years ago. Then it happened again recently and I moved to Bitwarden so that I can eventually migrate to a self-hosted solution.

I've been trying to get my family on board for years but it's still too complex. Non-technical folk still will take the path of least resistance, even when the dangers are right in front of their face. We need something better.

load more comments (6 replies)
[–] [email protected] 22 points 11 months ago (1 children)

My data has been stolen so often I have free monitoring for the rest of my life.

[–] [email protected] 7 points 11 months ago

And everyone should just assume that every account they have will be hacked. Because it already is, they just haven’t found out yet (assume breach).

[–] [email protected] 20 points 11 months ago

"The MOAB contains 26 billion records over 3,800 folders, with each folder corresponding to a separate data breach. While this doesn’t mean that the difference between the two automatically translates to previously unpublished data, billions of new records point to a very high probability, the MOAB contains never seen before information." Totaling 12TB.

[–] [email protected] 19 points 11 months ago* (last edited 11 months ago) (1 children)

I've always thought LinkedIn is nothing more than a massive treasure trove of personal information just waiting to be harvested by thieves wanting the entire life and work history of millions of upwardly mobile career focused people.

[–] [email protected] 5 points 11 months ago (1 children)

Work History ok... But entire life... I guess people that used like it's Facebook maybe? 🤔

load more comments (1 replies)
[–] [email protected] 7 points 11 months ago* (last edited 11 months ago) (1 children)

I honestly wonder if my data wouldn't be safer on some sites, if I skipped two-factor authentication and a recovery email, and simply used my date of birth as a password. At least then, they'd wouldn't be able to leak the phone number or email adress, because I was never forced to give it to them.

It's even more annoying, because you can't easily avoid many of these companies. Eg. for jobs it's really hard to get around using linkedin. I mean, I refuse out of principe and have for years, so my data's a decade out of data, but it's obviously cost me opportunities.

There are almost certainly pictures of me floating around social media, taken without my permission, but tagged by facebook or google just in case I had any fucking privacy. And now thanks to some phones. they also have our finger prints and retinal scans, which will inevitably get leaked sooner rather than later. I pity the poor chumps whose DNA was leaked, that's even worse. Most of that will probably be leaked sooner or later, if it hasn't already, because it turns out a subcontractor used the youtube comment section to communicate between departments.

If I had the technical ability, I would design a two-factor authentication system based on rectal scans.

"Here at OmniCorp we believe all our customers our unique, that's why we believe in securing your data by linking your DNA, phonenumber, social security number, retinal scan and finger print, with a picture of your anus. Bend Over. The Future's Now."

load more comments (1 replies)
[–] [email protected] 4 points 11 months ago

We just need a free dart monkey or two, it'll be fine.

[–] [email protected] 4 points 11 months ago* (last edited 11 months ago)

Tencent tops the chart, with 1.5 billion records leaked, followed by Weibo at 504 million and MySpace at 360 million.

MySpace in the news as Top Western Leaker

load more comments
view more: next ›