Internet and e-mail policy and practice
including Notes on Internet E-mail


Click the comments link on any story to see comments or add your own.

Subscribe to this blog

RSS feed

Home :: Internet

24 May 2014

Why do we accept $10 security on $1,000,000 data? Internet

Last week we heard of yet another egregious security breach at an online provider, as crooks made off with the names, address, and birth dates of eBay users, along with encrypted passwords. They suggest you change your password, which is likely a good idea, and you better also change every other place you used the same password. But that's not much help since you can't change your name, address, and birth date, which are ever so handy for phishing and identity theft.

There is plenty not to like about the way that eBay handled it, but a more important question is why we tolerate big allegedly sophisticated companies treating our personal information so casually.

According to eBay's press release, crooks

compromised a small number of employee log-in credentials, allowing unauthorized access to eBay's corporate network, ...

and then vacuumed up 145 million users' credentials. Say what? Random eBay employees can access all that customer data from the general corporate network, and all that's keeping it safe is the hope that none of their 33,000 employees have had their passwords phished? No wonder several state Attorneys General have opened investigations.

I do not purport to be a great data security whiz (knowing, as I do, just enough to play one in my blog), but even I know that you don't hook the valuable data directly to the corporate network, you limit bulk access with hardware tokens, and routine access with APIs that provide just what they need to run the system, e.g., verify whether an entered password is correct, retrieve one user's e-mail address so they can send her a note saying she's been outbid. You use multiple levels of security so if one breaks, the damage is limited by the others. All of this stuff was old in the 1980s. What were they (not) thinking?

We need to ask the same questions about AOL's giant data breach and Yahoo's giant data breach (not to be confused with their previous giant data breach in 2012), and Target's giant data breach and likely a dozen more that the companies haven't gotten around to noticing.

Large collections of personal data are valuable. Crooks will try and steal them. This is not news. It's 2014, so why are companies using security approaches that weren't really adequate 20 years ago for databases three orders of magnitude smaller than today's?

posted at: 23:06 :: permanent link to this entry :: 1 comments
posted at: 23:06 :: permanent link to this entry :: 1 comments

comments...        (Jump to the end to add your own comment)

IT Director
I don't see that it really makes sense to try to turn birht date, mother's maiden name or SSN into secret passwords and I am surprised that serious security professionals think it is possible. My birthdate was published in the newspaper when I was born, my SSN has been given out to innumerable entities. How can that be turned into a secret now?

(by Daniel Feenberg 03 Aug 2014 17:12)

Add your comment...

Note: all comments require an email address to send a confirmation to verify that it was posted by a person and not a spambot. The comment won't be visible until you click the link in the confirmation. Unless you check the box below, which almost nobody does, your email won't be displayed, and I won't use it for other purposes.

Email: you@wherever (required, for confirmation)
Title: (optional)
Show my Email address
Save my Name and Email for next time


My other sites

Who is this guy?

Airline ticket info

Taughannock Networks

Other blogs

Remembering JD Falk - 10 years later
223 days ago

A keen grasp of the obvious
New Hope for the Dead
465 days ago

Related sites

Coalition Against Unsolicited Commercial E-mail

Network Abuse Clearinghouse

© 2005-2020 John R. Levine.
CAN SPAM address harvesting notice: the operator of this website will not give, sell, or otherwise transfer addresses maintained by this website to any other party for the purposes of initiating, or enabling others to initiate, electronic mail messages.