this post was submitted on 30 Mar 2024
294 points (98.7% liked)

Technology

59534 readers
3195 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
all 27 comments
sorted by: hot top controversial new old
[–] Kongar@lemmy.dbzer0.com 95 points 7 months ago (1 children)

This crap is the new norm. Companies compile your data, don’t secure it, and the whole world becomes victims of identity theft. Then they get free credit monitoring from the companies that screwed then.

Use a strong password manager with unique complicated passwords.

Freeze your credit.

Assume someone is trying to impersonate you and open credit cards in your name at all times.

Sad state of affairs today.

[–] linearchaos@lemmy.world 18 points 7 months ago (2 children)

Freezing/unfreezing credit needs to be free and easy.

[–] Imgonnatrythis@sh.itjust.works 5 points 7 months ago

I've found it very easy. I just didn't know to do it until a couple years ago. I think it should be frozen by default.

[–] saltesc@lemmy.world -1 points 7 months ago (1 children)

American banks charge you for this?

[–] linearchaos@lemmy.world 13 points 7 months ago (2 children)

Talking about freezing credit checks, not card usage.

[–] saltesc@lemmy.world 2 points 7 months ago
[–] NoRodent@lemmy.world 1 points 7 months ago (1 children)
[–] linearchaos@lemmy.world 3 points 7 months ago (1 children)

With your social security number first and last name and some public record information you can apply for credit cards, loans, you name it. For the process to kick off a credit check is performed. The company that is offering to give you the money Will check one or all of the major credit bureaus to get your credit worthiness.

You can write a letter to the three credit bureaus and ask them to lock your credit status so if anyone checks them they will get nothing back. This is a free service as long as you've got plenty of time to wait. You can sign up for any one of a dozen different "credit monitoring" services for the rate of about $30 a month they'll let you turn your credit check on or off at will.

I think the credit bureau should be forced to provide you a portal to authenticate and turn your credit status on and off at will.

[–] NoRodent@lemmy.world 3 points 7 months ago (1 children)

Ah, thanks for the explanation.

Over here, when you're applying for a loan, you're the one who has to bring the proof of your credit worthiness - typically your employment contract, bank statement etc. - they can't have it automatically without your consent. Also you have to prove your identity with your ID (either the physical card which is mandatory to have, or I guess nowadays a secured electronic identification if you were to do it remotely somehow). So I was genuinely lost in this comment thread, not knowing what the exact process was in America.

[–] linearchaos@lemmy.world 1 points 7 months ago

Yeah, we're heavily leaning toward making borrowing easy to the point that any security breach puts us at risk. It's trivial with just a little private data to take out a loan or buy a car in someone else's name. It really sucks.

[–] Substance_P@lemmy.world 59 points 7 months ago (2 children)

"it’s not known whether the leak came from within the company or one of its vendors."

Isn't it time that big tech companies and their sale of private data get regulated? I see a giant class-action lawsuit in the making here.

[–] Lodra@programming.dev 37 points 7 months ago (1 children)

This is regulated. And there are penalties for violating those regulations. But it’s just not enough. Even a class action lawsuit won’t help the victims. Most of that money goes to lawyers.

Honestly, I don’t expect any of it to change until the penalties are so severe that major companies go under. Aka a corporate death penalty (which the US used to have). But even then, good software security is extremely hard. Almost everyone screws up something.

[–] rottingleaf@lemmy.zip 7 points 7 months ago

Aka a corporate death penalty (which the US used to have). But even then, good software security is extremely hard. Almost everyone screws up something.

So corps would be regularly "executed" because of not getting it right at some point and that leading to such events.

What's bad about that?

Companies are market entities, they are supposed to live for some time and die, so that evolutionary process would work.

Right now it's like titans eating their children, they should die from regulator's axe, ideally at the very moment when mistakes stop being sufficient to kill them.

[–] coolmojo@lemmy.world 7 points 7 months ago

It is. The third-party doctrine is a United States legal doctrine that holds that people who voluntarily give information to third parties—such as banks, phone companies, internet service providers (ISPs), and e-mail servers—have "no reasonable expectation of privacy" in that information. Source

[–] tal@lemmy.today 57 points 7 months ago* (last edited 7 months ago) (2 children)

Social Security numbers should really not be considered secret data. Too many places have leaked them.

Maybe -- maybe -- they're okay for uniquely-identifying someone, but they're a really bad way to authenticate someone.

I mean, this breach alone -- if these are Americans -- is something like 20% of the US population.

You can't rely on something as authentication data if 20% of the population has irrevocable credentials that are floating around.

[–] cybersandwich@lemmy.world 28 points 7 months ago (1 children)

I heard a security researcher say something like that a couple decades ago I think. The solution isn't to "safeguard SSN's", it's to make them pointless to have. Make it so you can't do anything with them.

Like you point out: this one breach alone could be 1/4 of the us population.

[–] tal@lemmy.today 3 points 7 months ago* (last edited 7 months ago)

For serious, emergency recovery, what I'd kind of like is some kind of service that performs physical validation of identity. Like, okay, say I lose my credentials to get into a bank account. So the bank gives me a recovery number, and I go down to the police station or something like that, and they do an identity check as part of that and sign off that you're who you say you are. Then if you're an identity thief, you're liable to get arrested right there. Charge a fee to cover the costs. Have a federal government server have to cryptographically sign that they're doing an identity validation so that the local cops can't silently sign off on someone else as being you. That should only come up if you've lost your credentials to something serious and need to get access again.

As an intermediate form of access, I suppose 2FA, though I'm not totally thrilled about having my keystore on a device that's network-connected, like a phone or computer, and has software getting put on it. Would rather have a physical USB-C dongle acting as a keystore with a small screen to identify the contents of a transaction being performed, and a physical "approve" button on the dongle. Plug that into a computer or smartphone or whatever. Maybe have different dongles for more- and less-sensitive stuff -- one for credit card payments that you carry around, one for insurance or something that you don't. Use pubkey authentication, not this shared-secret SSN stuff, so that if someone gets a company's database, it's useless in terms of letting them authenticate as you.

[–] Treczoks@lemmy.world 5 points 7 months ago

Just because way too many sites have a security that more or less non-existent, this should not be an excuse. Every breach should be severely punished. The only way corporations learn to take customer data safety seriously is through their wallets.

As long as customer data safety is just a cost factor, and penalties are just a mild slap on the wrist, there is no incentive to consider this as "just another cost of running business issue".

[–] minimalfootprint@discuss.tchncs.de 55 points 7 months ago (1 children)

Why companies aren't fined for every customers data they didn't secure properly is beyond me. This should cost them a specific sum per customer or part of their annual global revenue. Make it hurt.

Otherwise they have no reason to spend money to properly secure people's data.

[–] webghost0101@sopuli.xyz 10 points 7 months ago* (last edited 7 months ago) (2 children)

Devils advocate: It would give them additional insensitive to cover up the fact it happend.

My 2 cents: companies cant be trusted with your data and local data containers which you control, can give or reject limited acces to need to become the norm.

[–] WordBox@lemmy.world 5 points 7 months ago (1 children)

Cant cover it up if the hackers take credit. And with the info collected it won't take much time to pin point where it came from.

[–] webghost0101@sopuli.xyz 3 points 7 months ago

Its happened before that leaks where covered up for months though, gives them time to sell stocks before public backlash .

[–] douglasg14b@lemmy.world 2 points 7 months ago

I mean yeah it probably would. But that's essentially just blackmail.

For there should be is an entire branch of government dedicated to regulating and auditing data security in large corporations.

[–] tal@lemmy.today 24 points 7 months ago (1 children)

https://www.att.com/support/article/my-account/000101995?bypasscache=1

How do I know if my information was included?

If your information was impacted, you will be receiving an email or letter from us explaining the incident, what information was compromised, and what we are doing for you in response.

I think that you're gonna have a hard time tracking down 73 million people.

[–] RedEyeFlightControl@lemmy.world 24 points 7 months ago

You think they're going to send notices to ex-customers? I was an ATT customer for 2 decades and switched a few years ago. I'm wondering if I'm compromised, but won't get notice because I'm not technically an active customer.

[–] 667@lemmy.radio 1 points 7 months ago* (last edited 7 months ago)

So, basically every AT&T customer.