Miscellaneous Tech News
-
@Obsolesce said in Miscellaneous Tech News:
70TB of Parler users’ messages, videos, and posts leaked by security researchers
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken
Maybe they should have actually hired a professional or three instead Billy Bob’s web and app design.
One article said they were using the free tier of twilio for something also.
-
@Obsolesce said in Miscellaneous Tech News:
70TB of Parler users’ messages, videos, and posts leaked by security researchers
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken
Security researchers don't leak information. They let the platform know they found a leak and work with them to close it.
If they leak information, they are be definition hackers (crackers, black hats, hacktivists etc).
-
-
@Pete-S said in Miscellaneous Tech News:
@Obsolesce said in Miscellaneous Tech News:
70TB of Parler users’ messages, videos, and posts leaked by security researchers
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken
Security researchers don't leak information. They let the platform know they found a leak and work with them to close it.
If they leak information, they are be definition hackers (crackers, black hats, hacktivists etc).
At what point does someone go from being a security researcher who's raised the red flag to a platform who apparently refuses to fix simple but large vulnerabilities to a black-hat?
There are numerous cases of White-Hats saying "hey we gave them months to fix this issue and we were continually ignored, for the security of the users, we're making this public to get the platform to fix this issue"
-
@travisdh1 said in Miscellaneous Tech News:
I got the email from Ubiquiti today:
Dear Customer,
We recently became aware of unauthorized access to certain of our information technology systems hosted by a third party cloud provider. We have no indication that there has been unauthorized activity with respect to any user’s account.
We are not currently aware of evidence of access to any databases that host user data, but we cannot be certain that user data has not been exposed. This data may include your name, email address, and the one-way encrypted password to your account (in technical terms, the passwords are hashed and salted). The data may also include your address and phone number if you have provided that to us.
As a precaution, we encourage you to change your password. We recommend that you also change your password on any website where you use the same user ID or password. Finally, we recommend that you enable two-factor authentication on your Ubiquiti accounts if you have not already done so.
Ugh.
Yepp.... I got one too. I suppose that I should go change my password.
-
@dafyre said in Miscellaneous Tech News:
Yepp.... I got one too. I suppose that I should go change my password.
Yeah it took seconds. Hope onto that
-
@DustinB3403 said in Miscellaneous Tech News:
@dafyre said in Miscellaneous Tech News:
Yepp.... I got one too. I suppose that I should go change my password.
Yeah it took seconds. Hope onto that
I'm not sure what my password is anyway, lol. I should check my password manager and see if it knows, lol.
-
@DustinB3403 said in Miscellaneous Tech News:
@Pete-S said in Miscellaneous Tech News:
@Obsolesce said in Miscellaneous Tech News:
70TB of Parler users’ messages, videos, and posts leaked by security researchers
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken
Security researchers don't leak information. They let the platform know they found a leak and work with them to close it.
If they leak information, they are be definition hackers (crackers, black hats, hacktivists etc).
At what point does someone go from being a security researcher who's raised the red flag to a platform who apparently refuses to fix simple but large vulnerabilities to a black-hat?
There are numerous cases of White-Hats saying "hey we gave them months to fix this issue and we were continually ignored, for the security of the users, we're making this public to get the platform to fix this issue"
You are a black hat when you're main goal is to simply steal and dump or steal and do other bad things.
No one is calling Google's Project Zero hackers/black hats because they give a, what 90 day window to companies to fix their shit before they post about it.
But really, if you're white - YOU should never dump someone else's data. Period. Dumping is very likely an act that is over the line and makes you a black hat.
You don't need to dump their data to embarrass the hell out of a company... just tell the world about them, and post how you found said data - others will go and pull it out and post it...
-
@DustinB3403 said in Miscellaneous Tech News:
At what point does someone go from being a security researcher who's raised the red flag to a platform who apparently refuses to fix simple but large vulnerabilities to a black-hat?
There are numerous cases of White-Hats saying "hey we gave them months to fix this issue and we were continually ignored, for the security of the users, we're making this public to get the platform to fix this issue"The difference between a hacker and a security researcher is the intent.
This is from the arstechnica article:
"To recap, the scraping was pulled off by a hacker who goes by the handle donk_enby. She originally set out to archive content posted to Parler last Wednesday in hopes of preserving self-incriminating material before account holders came to their senses and deleted it."That is obviously not security research in any way shape or form.
donk_enby goes on:
“I want this to be a big middle finger to those who say hacking shouldn’t be political,”So a hacktivist.
-
@Pete-S said in Miscellaneous Tech News:
That is obviously not security research in any way shape or form.
Not from the technical side. But in a weird way, it's like a technical hacker using hacking to do social security research.
-
@JaredBusch said in Miscellaneous Tech News:
File under: Fucking Duh.....
Signal and Telegram downloads surge after WhatsApp says it will share data with Facebook
That explains why my Telegram is blowing up with new members.
-
@DustinB3403 said in Miscellaneous Tech News:
@Pete-S said in Miscellaneous Tech News:
@Obsolesce said in Miscellaneous Tech News:
70TB of Parler users’ messages, videos, and posts leaked by security researchers
The scrape includes user profile data, user information, and which users had administration rights for specific groups within the social network. Twitter user @donk_enby, who first announced about the scrape, claims that over a million video URLs, some deleted and private, were taken
Security researchers don't leak information. They let the platform know they found a leak and work with them to close it.
If they leak information, they are be definition hackers (crackers, black hats, hacktivists etc).
At what point does someone go from being a security researcher who's raised the red flag to a platform who apparently refuses to fix simple but large vulnerabilities to a black-hat?
There are numerous cases of White-Hats saying "hey we gave them months to fix this issue and we were continually ignored, for the security of the users, we're making this public to get the platform to fix this issue"
Well, at some point, maybe you are both. One person's researcher is another person's black hat. To me, as a customer, knowing that vendor X has a vulnerability and that I need to be aware of it is research. To that vendor, sharing their mistakes might be perceived as black hat.
It's a bit like terrorism. Every terrorist is someone's army. What we called Patriots in the American Revolution, the British considered terrorists. It's all perspective.
So in one sense, every white hat is also a black hat. If you find a vulnerability and tell the vendor, and not the customers, you are a black hat to their customers, but a white hat to the vendor. If you tell the customers before the vendor has a fix, you are a black hat to the vendor, and a white had to the customers.
-
@Pete-S said in Miscellaneous Tech News:
So a hacktivist.
Something we could say about anyone in a white hat, in a way.
-
@Dashrender said in Miscellaneous Tech News:
You are a black hat when you're main goal is to simply steal and dump or steal and do other bad things.
This is true and simple. But what about if you get the data and don't share it with the people impacted? Isn't that also a black hat move? To conceal a known vulnerability that others might be using to steal data to protect a vendor?
Not that it's only about protecting a vendor, but that's a huge force at play in those cases.
-
@Dashrender said in Miscellaneous Tech News:
No one is calling Google's Project Zero hackers/black hats because they give a, what 90 day window to companies to fix their shit before they post about it.
I call that black hat, absolutely. Because they know that customers are at risk and don't tell them. Maybe it's the right decision, maybe it is not, but that's 90 days of wearing a black hat if I'm a customer and they are holding secret information about how to breach me and they've chosen to tell someone other than me, the customer.
As a customer, I have more right to be told than anyone and I believe telling vendors before customers should be considered a crime. I don't agree with the "black hat for a while" thing that people have sold.
-
@Dashrender said in Miscellaneous Tech News:
But really, if you're white - YOU should never dump someone else's data. Period. Dumping is very likely an act that is over the line and makes you a black hat.
Hacking to get access and actually taking data are two different steps. The one is about "getting in", cracking the safe or whatever.
The question between white and black is... if you can crack a safe, do you tell someone? If so, who and when? But there's no question that cracking a safe AND stealing the contents is always stealing.
-
@Dashrender said in Miscellaneous Tech News:
You don't need to dump their data to embarrass the hell out of a company... just tell the world about them, and post how you found said data - others will go and pull it out and post it...
Exactly, and this is where we get back to.... to the vendor you're a black hat, to their customers, the public, competitors, you are a white hat.
-
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
No one is calling Google's Project Zero hackers/black hats because they give a, what 90 day window to companies to fix their shit before they post about it.
I call that black hat, absolutely. Because they know that customers are at risk and don't tell them. Maybe it's the right decision, maybe it is not, but that's 90 days of wearing a black hat if I'm a customer and they are holding secret information about how to breach me and they've chosen to tell someone other than me, the customer.
As a customer, I have more right to be told than anyone and I believe telling vendors before customers should be considered a crime. I don't agree with the "black hat for a while" thing that people have sold.
So you propose that Google's Project Zero should make a public announcement about every vulnerability they find the moment they find them - there would be no other way Google would know who is using said software.
Yeah, that seems utterly irresponsible. I mean I get why you think that, but in doing so you've also just released another zero day to the masses of hackers. While it's possible that no one was being hacked by this vulnerability, with your announcement, there is zero chance that someone new won't be hacked by this.
-
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
You don't need to dump their data to embarrass the hell out of a company... just tell the world about them, and post how you found said data - others will go and pull it out and post it...
Exactly, and this is where we get back to.... to the vendor you're a black hat, to their customers, the public, competitors, you are a white hat.
Many customers will decry you as well if you publicly announce this hack before there is any chance of remediation. Right or wrong, they'll do it.
-
@Dashrender said in Miscellaneous Tech News:
@scottalanmiller said in Miscellaneous Tech News:
@Dashrender said in Miscellaneous Tech News:
No one is calling Google's Project Zero hackers/black hats because they give a, what 90 day window to companies to fix their shit before they post about it.
I call that black hat, absolutely. Because they know that customers are at risk and don't tell them. Maybe it's the right decision, maybe it is not, but that's 90 days of wearing a black hat if I'm a customer and they are holding secret information about how to breach me and they've chosen to tell someone other than me, the customer.
As a customer, I have more right to be told than anyone and I believe telling vendors before customers should be considered a crime. I don't agree with the "black hat for a while" thing that people have sold.
So you propose that Google's Project Zero should make a public announcement about every vulnerability they find the moment they find them - there would be no other way Google would know who is using said software.
Yeah, that seems utterly irresponsible. I mean I get why you think that, but in doing so you've also just released another zero day to the masses of hackers. While it's possible that no one was being hacked by this vulnerability, with your announcement, there is zero chance that someone new won't be hacked by this.
No, don't announce it to the general public, but to paying customers, yes absolutely disclose the vulnerability and remediation (if the client has to do something).