I have a solution:
governments should heavily fine companies that are subject to data breaches.
If it cost them real money (proportional to their market cap, the amount of customers affected, and/or the severity of the breach) to allow a data breach, I’m betting they’d shore up those holes REALLLLLLLLLL QUICK.
This is always the answer. “How do we solve x in y industry?” Make the fucking corpos responsible for their own asses and it will get fixed. If it costs them more money to be breached they will do everything they can to not allow that.
That, or threaten to nationalize their industry. Corporations *hate * that.
Communications should always be nationalized. It was a mistake letting corporations gatekeep phones and internet.
Infastructure should be nationalized as a whole (roads, rails, water, heating, electricity, waste disposal and so on)
How about Intel?
Obviously a typo, nice one
Internet is also communication. works great in North Korea.
“Externalities” are just expenses that corporations incur that have to be paid by the public.
Make externalities losses again.
It’ll also screw over anyone trying to break into the market, ensuring that the big tech companies remain unchallenged indefinitely.
Disagree if you add the three different factors that I added to account for this in my original comment:
As I wrote in my edit, I think the size of fine should be dependent on:
-
size of company
-
the reasonable expectation of security (which would partially attempt to decrease fines for unfixable breaches)
-
the number of unique users affected
I think that’s a great starting point for effective legislation.
I also think this could easily be twisted to become yet another artificial barrier to entry.
I don’t know what to do with that knowledge…I think you’re correct, but I also think there’s no way to pass such a law with its spirit intact today
I’ll put the ball in your court.
I’ve completely and irreparably broken up with electoral politics in the United States ever since my tax money started being spent solely on austerity and genocide. It’s about as likely for this to be introduced as a bill as it is for a third party to win a presidential election…ie IMPOSSIBLE.
-
They’re too busy proposing legislation to create back doors that completely circumvent security in the first place.
Yeah, people shouldn’t look to their government to protect them from this. Hell, I’d be willing to bet no small amount of taxes go to purchasing the leaked info at places like the CIA, NSA, and FBI.
Nah, throw the board members in prison. If the punishment for crime is a fine then it’s legal for rich people/corps. Put 'em in solitary and feed them nutraloaf for one day for each person’s data they allowed to be leaked.
If they get all the money because they’re ultimately responsible, we should make them ultimately responsible.
if it means prison time for a middle/lower class person, it should mean prison time for everyone who is responsible for basically publishing logins and personal data.
no more geeting off scott free because you run a company. you’re a prisoner like everyone else now.
HELL YEAH, comrade! 🌹
I was just working inside of the confines of shitliberalism because it’s seemingly all we have in the United Corporations that run America.
Hail Comrade!! 🙏🤞
Here’s the summary for the wikipedia article you mentioned in your comment:
Nutraloaf (also known as meal loaf, prison loaf, disciplinary loaf, food loaf, lockup loaf, confinement loaf, seg loaf, grue or special management meal) is food served in prisons in the United States (and formerly in Canada) to inmates who have misbehaved, abused food, or have inflicted harm upon themselves or others. It is similar to meatloaf in texture, but has a wider variety of ingredients. Prison loaf is usually bland, even unpleasant, but prison wardens argue that nutraloaf provides enough nutrition to keep prisoners healthy without requiring eating utensils.
As much as I agree that something needs to be done to these companies, and that they deserve punishment, I think this approach would only result in leaks (even more) underreported, which makes it even worse.
Are these leaks even being reported by companies? Every article I have seen so far has just been compiling information off the new leaked data set someone picked up off the dark web or something.
They weren’t, which is why the SEC updated 17 CFR Parts 229, 232, 239, 240, and 249.
https://www.sec.gov/files/rules/final/2023/33-11216.pdf
As of December 18th of last year, publicly traded companies are now required to disclose breaches. (soz, material cybersecurity incidents).
Prior to that, they could …basically… just effectively sweep everything under the rug “like it never happened” minus a little handwaving and paper shuffling and nobody would find out about it until the information got sold and went public.
I’ll have to go looking but I would be SERIOUSLY surprised if the disclosures apply to credit card companies (the MOST breached, historically) because I’m not sure what exactly qualifies someone as an asset-backed issuer, but it’s at least a really good step for the REST of things.
Article 82, paragraph 1 of the GDPR:
Any person who has suffered material or non-material damage as a result of an infringement of this Regulation shall have the right to receive compensation from the controller or processor for the damage suffered.
Paragraph 2:
Any controller involved in processing shall be liable for the damage caused by processing which infringes this Regulation
Article 24, paragraph 1:
**[T]he controller shall **implement appropriate technical and organisational measures to ensure and to be able to demonstrate that processing is performed in accordance with this Regulation.
Article 5, paragraph 1f:
Personal data shall be: […] processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss,
Article 83, paragraphs 2 and 5:
Each supervisory authority shall ensure that the imposition of administrative fines pursuant to this Article in respect of infringements of this Regulation referred to in paragraphs 4, 5 and 6 shall in each individual case be effective, proportionate and dissuasive.
Infringements of the following provisions shall, in accordance with paragraph 2, be subject to administrative fines up to 20 000 000 EUR, or in the case of an undertaking, up to 4 % of the total worldwide annual turnover of the preceding financial year, whichever is higher:
(a) the basic principles for processing, including conditions for consent, pursuant to Articles 5, 6, 7 and 9;
Article 4, paragraph 7:
‘controller’ means the natural or legal person, public authority, agency or other body which, alone or jointly with others, determines the purposes and means of the processing of personal data
(All quotes are excepts, emphasis mine
I think we can both guess why these companies never really face penalties that hurt them materially despite this being codified into law in the EU…
I got lost in the comments… why did you paste that here? To show that it is possible to make the data controller liable for breaches?
Exactly. This is supposed to show that what @demesisx@infosec.pub demands is already law in the EU.
They won’t because fines are just a fee to allow them to run unethically. That way businesses get more profit than they would otherwise and government gets their cut to allow it. It’s broken by design.
The EU has proven time and again that fines can hurt.
This is the stupidest idea I’ve ever heard. You don’t fine a bank for getting robbed. This reeks of frontend engineer idiocy, which is ironically the exact type of idiocy that tends to cause breaches like this.
Every time some corporatist replies to me, they’re always kbin.
Your analogy falls apart with even a cursory thought about the differences between banks (which are required to be insured against loss which would make a customer whole again without any negative effects) and corporations that just throw all of their customers’ data onto a portal that lacks basic protection. Once that personal data is compromised, there’s no way to repay the customer and no amount of fines will EVER right that wrong. In a properly-regulated, just society, a bank would ABSOLUTELY be fined back to the Stone Age if they left their customers’ cash in the middle of a town square, for example.
Be better, you corporate cuck.
Ok then, how about considering that this will only serve to benefit the big tech companies because they’re the ones that can afford the fines? A breach is usually enough to make a smaller company go out of business already between cleanup and lawsuits. Why make it easier for the big tech companies to maintain power?
Did you even read my comment? I specifically mentioned that the size of the fine could be tied to their market cap.
If you work in cyber security, you’d know that there are best practices in place for cybersecurity and it is a WELL UNDERSTOOD FIELD. The main advice everyone gives is to never roll your own cryptography…and that is EXACTLY what many of the hacked companies did.
Taking a shortcut and hiring shitty devs who just use some random NPM package for security and call it a day is exactly why there are so many breaches. Just as bridges need to be built to withstand double or triple their weight, there should be STANDARDS in place that if violated are subject to fines.
Companies like Google would basically have to build SUPER SECURE technologies lest they be bankrupted by a breach.
In conclusion, please try to remove your tongue from your exploitive employer’s back side.
I did miss that, but again, it’s additional fines on top of an almost guaranteed lawsuit for something that may not even be their fault. If they got owned by a Heartbleed exploit back when it was first announced and a fix wasn’t available yet, should a company be responsible for that? What about when they get hit by a vuln that’s been stockpiled for a couple years and purposely has no fix due to interference from bad actors? There are a lot of situations where fining someone for getting breached doesn’t make sense.
You make great points but my final point is this: if a company simply cannot guarantee protection of user data, it shouldn’t be trusted with user data in the first place.
And I’ll counter with this: no system is perfect, especially when major parts are made by non-employees. Mistakes can and do happen because corporations, regardless of size, are made up of humans, and humans are really good at fucking up.
Kind of worrying when their source is a “data breach information website” that does advertorials for “the most safe password manager” NordPass. 🤮 The internet of today has become a pile of absolute shit.
We should make a new internet in the dark web, but only invite cool people. No billionaires, narcs nor finks allowed !
No narcs or finks? What about patsies or stoolies? Can we at least have phonies?
I’ll give you one chump and half a busta, but that’s all you’re getting!
Best I can do is two scrubs and whatever’s left of our collective hope for the species.
I don’t want no scrubs
What about phonie bronies?
Absolutely not !
Yes: -coolsters -rad dudes -rockin chicks -chill peeps
No: -bilionaires -narcs -finks -Howard (yes you, Howard)
Howard is the worst, after Bill Gates
I think it’s gotten to the point that we. (Collective) Have to start using alias. I know proton for a price gives fake mobile and email address.
I have started using a 5th email to sign up to things. Have an extra number as well. It’s beyond a joke really.
Tried to sign up for a budget app and it requires email phone and address.
No. No you don’t require any of that. You want that to sell. And you’ve likely got inadequate protection.
Nobody but my bank job and maybe a few places require all my info.
Oh proton gives mobile too… Ya know I didn’t feel like paying for the mail thing as I can have my domain and relay easily but the mobile thing I didn’t know.
But I will be honest I didn’t see it mentioned on the web, it’s already a thing?
They only generate email addresses.
Am I blind or are none of these actually offered by Proton themselves?
But could this also bypass dumb VoIP requirements for things like SMS 2FA?
I’ve tried using my Google Voice similarly but I’m faced with “I’m sorry but this number cannot be used for this.”
Could you use Google voice to generate a dumby phone line ? There are probably better non-google options now though.
The problem here is that all of the registration information that is listed for a number (OCN, LATA, etc) allows them to track back what TYPE of number it is based on what ILEC/CLEC it’s registered with and how it’s registered.
This means when I put my google voice number into some things, they can come back and yell that it’s not a mobile phone, or that it’s a virtual number, or whatever and disallow it.
Why do you not just use OpenOffice Calc for your budgeting?
What’s that ? Just excel spreadsheet?
Yeah except it’s fully FOSS. If you set up nextcloud there’s even a web app for it that’s pretty good.
Will need to check It out. Will it play nice with other applications ?
I used it in college and never had any problems, it seems to have feature parity with Excel. I used Excel professionally for a while and some of the workflows are a little different, but on the whole it’s really intuitive and easy to use. I’m sure there are other FOSS budgeting solutions, but Calc works so well for me I don’t see myself using anything else.
Not until a politician or billionaire is harmed by these breaches will we see some action.
They’ll get justice, you’ll get a check in the mail for 3 dollars, after some lawyers win a class action lawsuit.
I don’t think so.
Trump himself was victim of credential stuffing. And he’s not the only politician or billionaire who has suffered stolen accounts of something.
You’d have to have the data breach also be the cause of them losing massive amounts of wealth, which probably isn’t going to happen.
That seems weird, it’s called mother of all breaches, but isn’t the result of any one breach. It’s just data collection from ordinary breaches with perhaps some credential stuffing in the mix.
deleted by creator
I had an identity theft a few years back, still cleaning up from it. At the time I had the typical set of standard passwords that I would use. I thought they were ok since they were pretty random but I had one for Financial, one for Web Services, etc. so of course when the creds leaked, I suddenly had a bunch of credit card bills I never signed up for…
Since then, every password is unique, my default is 31 characters, and 2-factor for everything possible. Unfortunately I initially settled on LastPass, figured that they had hopefully learned their lesson from their breach years ago. Then it happened again recently and I moved to Bitwarden so that I can eventually migrate to a self-hosted solution.
I’ve been trying to get my family on board for years but it’s still too complex. Non-technical folk still will take the path of least resistance, even when the dangers are right in front of their face. We need something better.
Who do you recommend?
I use Keepass with Syncthing as the sync backend. Syncthing comes as a Docker container these days and sets up in seconds, I like how it doesn’t rely on a central server and gives you some redundancy.
Also, Keepassxc is a rewrite with better integration, true cross platform support and more features, keepassxc.org
Thoughts on 1Password?
They are okay, but I had massive problems with their browser plugin after a while and moved to bitwarden
I don’t know much about them to be honest, and what little I have heard sounded like it was paid for. My knee jerk reaction is to avoid them. Maybe they’re decent, maybe not. Couldn’t say.
My data has been stolen so often I have free monitoring for the rest of my life.
And everyone should just assume that every account they have will be hacked. Because it already is, they just haven’t found out yet (assume breach).
“The MOAB contains 26 billion records over 3,800 folders, with each folder corresponding to a separate data breach. While this doesn’t mean that the difference between the two automatically translates to previously unpublished data, billions of new records point to a very high probability, the MOAB contains never seen before information.” Totaling 12TB.
I’ve always thought LinkedIn is nothing more than a massive treasure trove of personal information just waiting to be harvested by thieves wanting the entire life and work history of millions of upwardly mobile career focused people.
Work History ok… But entire life… I guess people that used like it’s Facebook maybe? 🤔
LinkedIn is trying to encourage people to use it as a social networking site.
I honestly wonder if my data wouldn’t be safer on some sites, if I skipped two-factor authentication and a recovery email, and simply used my date of birth as a password. At least then, they’d wouldn’t be able to leak the phone number or email adress, because I was never forced to give it to them.
It’s even more annoying, because you can’t easily avoid many of these companies. Eg. for jobs it’s really hard to get around using linkedin. I mean, I refuse out of principe and have for years, so my data’s a decade out of data, but it’s obviously cost me opportunities.
There are almost certainly pictures of me floating around social media, taken without my permission, but tagged by facebook or google just in case I had any fucking privacy. And now thanks to some phones. they also have our finger prints and retinal scans, which will inevitably get leaked sooner rather than later. I pity the poor chumps whose DNA was leaked, that’s even worse. Most of that will probably be leaked sooner or later, if it hasn’t already, because it turns out a subcontractor used the youtube comment section to communicate between departments.
If I had the technical ability, I would design a two-factor authentication system based on rectal scans.
“Here at OmniCorp we believe all our customers our unique, that’s why we believe in securing your data by linking your DNA, phonenumber, social security number, retinal scan and finger print, with a picture of your anus. Bend Over. The Future’s Now.”
“hop up here on the table so I can scan that ass”
Tencent tops the chart, with 1.5 billion records leaked, followed by Weibo at 504 million and MySpace at 360 million.
MySpace in the news as Top Western Leaker
We just need a free dart monkey or two, it’ll be fine.
They said this about the equivalent breach, and yet here we are.