Source: dispeak

Category: Technology, Video

Please use the comments to demonstrate your own ignorance, unfamiliarity with empirical data and lack of respect for scientific knowledge. Be sure to create straw men and argue against things I have neither said nor implied. If you could repeat previously discredited memes or steer the conversation into irrelevant, off topic discussions, it would be appreciated. Lastly, kindly forgo all civility in your discourse . . . you are, after all, anonymous.

5 Responses to “How I Was Hacked”

  1. constantnormal says:

    It is probably worth noting that nothing here of necessity involved the internet. The “hacking” that occurred was good old-fashioned social engineering, the kind that goes on daily with credit and debit cards, and in days gone by was employed in forging checks. The medium that these thefts employ is almost irrelevant. What the internet provides is speed, and instant access to black markets to re-sell looted information.

    How can we stop this?

    From the terminal nodes of the internet, we cannot. It will require two things, to deal with this problem, and nothing less will even make a dent in it.

    1) We must adopt strong personal identification, which is the toughest part of the problem. Visual biometric identification, even retina scans, can generally be fooled by holding a photo up to the camera. Fingerprints can be stolen. Even if we had fast & cheap DNA analysis, we are all shedding bits of our DNA everywhere we go. I have no idea how we can create a strong personal identification system, but we must do so ASAP. 2-part passcode authentication in a step in the right direction, but everyone will resist any move that makes authentication more complex.

    2) We must legislate/regulate the storage and transmission of personal data. Encryption must be employed everywhere, especially including storage (which needs to be on systems with no direct connection to the internet) and backups of that storage. But can you really see our government pushing for not just widespread, but complete encryption of all email? Including the address fields? And when I say legislate, I am talking mandatory jail time for failures to comply. Fines will not induce compliance. Note that this means every business and individual replacing their disk drives and routers with devices that have embedded (and upgradable) encryption hardware. And owners of transmission lines will also have to upgrade their electronics. This is not a cheap fix.

    Once those two things have been universally adopted, a lot of these problems will shrink to the size of gnats. But they will never completely go away.

    But seeing as how the likelihood of these two measures being implements is less than winning the next Powerball drawing, I think we will have to learn to live with being hacked like this, and will simply make it easier for those whose identities have been stolen to regenerate them. And that in itself opens up still more opportunities to get hacked.

    I think that the Powers-That-Be are smoking some serious weed if they think that they will be able to fix our national cyber vulnerabilities by just pointing out that our critical infrastructure is wide open to attack. Hell, our whole society is “wide open to attack”.

  2. couragesd says:

    I am looking forward to the myIDkey biometric flash drive launch. It is one of a few things that will get things moving n the right direction. http://www.engadget.com/2013/02/20/myidkey-kickstarter/

    The other news I have been following are progress made with Quantum computing. Based on recent advances, switches and control of quantum behavior I think that we are likely 10 yrs away from this form of data storage and transfer . I can’t tell when we it will reach the consumer. This will be virtually impossible to hack.

  3. Greg0658 says:

    1st – I dislike av files starting on their own when I click into a thread

    2nd – cn I watched about 10 of that 20m and got generally the same feeling .. reading thru it I couldn’t help but think of the following av file
    a good analysis tho

    3rd – I love the www – best mankind invention to blow everything up yet .. nukes are to destructive
    Biological Clock Scene from My Cousin Vinny (2m11s)
    http://www.youtube.com/watch?v=7J-2EIvItVY

    4th – PayPal has a dongle device OR another opsys that sends a texted code to your cell phone that must be inputed in time to complete a transaction – time and convenience being the operative there

  4. Greg0658 says:

    ps – just did some research – I noticed DollarGeneral offering a PayPal button like the other credit cards at the checkout. Wondered who else is onboard. Seems HomeDepot by blogger input. Seems there are issues of things falling into place. I’m not using it and appears to be a debit card stance with its own pin#. I searched for a fee structure ie who pays for that – not found.

    https://www.paypal-community.com/t5/About-Payments/dollar-general-in-store-payment/td-p/579826/

  5. Slash says:

    I try to mitigate this problem by not having everything on my effing phone (which is not an iPhone). I don’t surf the web on it or pay for stuff with it.

    This doesn’t make me impervious to identity theft, of course, but I’m hoping it could keep someone from having every bit of information about me to do with whatever they want.

    And I back up more than once every two years. Holy crap, for “tech” guys, they’re awfully dumb.