Page 2 of 2 FirstFirst 12
Results 17 to 25 of 25

Thread: News - Sony pictures loses 1,000,000 passwords

  1. #17
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Again I completely agree, which is why it's nice to see client-side encryption on any service holding private data. Unlike Dropbox for example which, although they do store data encrypted (apparently), it's server-side and they keep the keys in their own database. I mean it would be hard to keep the same functionality with client-side crypto (https access for instance) but it would be a nice option. Also, something which makes me suspicious about their encryption is, if you drag a large but likely common file into your Dropbox folder, and Ubuntu iso for instance, it syncs almost instantly which shows they are using some form of deduplication. I really don't see how that could work with good encryption, maybe they're using block-level dedup with ECB mode? In which case it's still not that secure anyway...

  2. #18
    The late but legendary peterb - Onward and Upward peterb's Avatar
    Join Date
    Aug 2005
    Location
    Looking down & checking on swearing
    Posts
    19,378
    Thanks
    2,892
    Thanked
    3,403 times in 2,693 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Anything remotely sensitive that I wish to store on dropbox I encrypt anyway. Trivially easy to do.
    (\__/)
    (='.'=)
    (")_(")

    Been helped or just 'Like' a post? Use the Thanks button!
    My broadband speed - 750 Meganibbles/minute

  3. #19
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Yep, but I think it's misleading to claim everything is super-secure and not accessible by anyone but you, when in theory it could be.

  4. #20
    Pseudo-Mad Scientist Whiternoise's Avatar
    Join Date
    Apr 2006
    Location
    Surrey
    Posts
    4,274
    Thanks
    166
    Thanked
    386 times in 233 posts
    • Whiternoise's system
      • Motherboard:
      • DFI LANPARTY JR P45-T2RS
      • CPU:
      • Q6600
      • Memory:
      • 8GB DDR2
      • Storage:
      • 5.6TB Total
      • Graphics card(s):
      • HD4780
      • PSU:
      • 425W Modu82+ Enermax
      • Case:
      • Silverstone TJ08b
      • Operating System:
      • Win7 64
      • Monitor(s):
      • Dell 23" IPS
      • Internet:
      • 1Gbps Fibre Line

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by Saracen View Post
    Depends what the site is for, and what you've agreed to. It's probably not a good idea if, for instance, it's your bank. It may well be thee case that at the least, it's breach of contract, and puts your account at risk if they catch you doing it.

    For that reason, my attitude is that if such data is optional, I don't include it. If it's mandatory, I think very carefully about whether I want whatever that site offers badly enough to give it up. And for things like phone numbers and email addresses, it's why I have "burnable" instances of both - if they get abused, I dump them.

    On the other hand, there's sometimes a downside to not filling it some data. If you want help with your PC, on here, then it may ell help to have filled in profile fields. But it's optional.

    But for "security" data, personally, I will not EVER provide accurate data to anyone that doesn't have a valid reason to know, like banks or the government. If a forum wants DoB, they'll get nothing or a fictional one if it's mandatory, and I never use things like my mother's maiden name, including for (or rather, especially for) sites where security matters.

    It's impossible to keep all personal data personal in today's society, but I'm very selective about who I tell what. You cannot prevent risks to personal data, unless you have a hankering for being a monk in a secluded retreat, but you can minimise them.
    I would hope most people are clever enough to give honest data when required (and that it was implied). However, if I need a service that asks me to provide data that I don't think it needs (say, trial software), I normally use fake information - why do they need my address?

    Similarly if I need to use an email address for something not 'mission critical', I use 10 minute mail.

    And of course there are situations where it would be stupid to provide fake info - if you're getting something delivered, for instance.

    For 'mission critical' passwords/details it's far easier just to hide them in an innocuous place at home, such as inside a book, or whatever your poison. The odds of being burgled are relatively low, though it has happened to me, but it would have to be either a police investigation or a determined burglar to find the details. Even then it's incredibly easy to use further obfuscation - say ringing page numbers or transposing the digits, writing the number in reverse (for something like a PIN it works simply because the crook only has 3 guesses normally). An enterprising burglar might check through your library to see if you've hidden cash between the pages, but I can't see any actually reading them all to get to the honey.


    http://wuala.com/ has client side encryption built in. Same limits as dropbox (for the vast majority of people 2GB is more than enough). I use Dropbox mostly because it's stupidly useful for collaborating in group projects and most people have it these days. However, for stuff like syncing my 1password file, I use Wuala, still not amazing having to share it over the web, but until I can get hold of a home server it'll do.

  5. #21
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by Whiternoise View Post
    http://wuala.com/ has client side encryption built in. Same limits as dropbox (for the vast majority of people 2GB is more than enough). I use Dropbox mostly because it's stupidly useful for collaborating in group projects and most people have it these days. However, for stuff like syncing my 1password file, I use Wuala, still not amazing having to share it over the web, but until I can get hold of a home server it'll do.
    Something else I'll have to try out. I also stumbled upon yet another one called SpiderOak you may wish to try.

  6. #22
    Pseudo-Mad Scientist Whiternoise's Avatar
    Join Date
    Apr 2006
    Location
    Surrey
    Posts
    4,274
    Thanks
    166
    Thanked
    386 times in 233 posts
    • Whiternoise's system
      • Motherboard:
      • DFI LANPARTY JR P45-T2RS
      • CPU:
      • Q6600
      • Memory:
      • 8GB DDR2
      • Storage:
      • 5.6TB Total
      • Graphics card(s):
      • HD4780
      • PSU:
      • 425W Modu82+ Enermax
      • Case:
      • Silverstone TJ08b
      • Operating System:
      • Win7 64
      • Monitor(s):
      • Dell 23" IPS
      • Internet:
      • 1Gbps Fibre Line

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by watercooled View Post
    Something else I'll have to try out. I also stumbled upon yet another one called SpiderOak you may wish to try.
    Ah yeah, SpiderOak was the one I was looking for when I found wuala - I couldn't remember the name!

  7. #23
    Senior Member
    Join Date
    Mar 2005
    Posts
    4,826
    Thanks
    161
    Thanked
    358 times in 288 posts
    • badass's system
      • Motherboard:
      • ASUS P8Z77-m pro
      • CPU:
      • Core i5 3570K
      • Memory:
      • 32GB
      • Storage:
      • 1TB Samsung 850 EVO, 2TB WD Green
      • Graphics card(s):
      • Radeon RX 580
      • PSU:
      • Corsair HX520W
      • Case:
      • Silverstone SG02-F
      • Operating System:
      • Windows 10 X64
      • Monitor(s):
      • Del U2311, LG226WTQ
      • Internet:
      • 80/20 FTTC

    Re: News - Sony pictures loses 1,000,000 passwords

    Quote Originally Posted by Saracen View Post
    Even hashes have their limitations, especially if you know how the hash is calculated, and have database access.

    Years ago (and nor on Hexus) I ran a little check. I ran various standard passwords (like "password" and "letmein", etc) though an MD5 hash generator, and then did a database search on a fairly large forum database. The number of hits was quite shocking.
    What you did there was use a very small rainbow table - a proof of concept if you like.

    Salting the passwords mitigates the effectiveness of this kind of attack.

    A rainbow table is more or less a dictionary of hashes. It's a great way of looking through a large database of passwords for simple ones. Salting the passwords adds security by adding some random characters to the beginning or end. It means if you use the same password in 2 locations, you get idfferent hashes. It also hugely reduces the effectiveness of a rainbow table as it'll need the be the size of the dictionary multiplied by the number of key combinations to the power of the number of characters added.
    "In a perfect world... spammers would get caught, go to jail, and share a cell with many men who have enlarged their penises, taken Viagra and are looking for a new relationship."

  8. #24
    Senior Member watercooled's Avatar
    Join Date
    Jan 2009
    Posts
    11,459
    Thanks
    1,539
    Thanked
    1,024 times in 868 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    Simply running the plaintext password through a hash function and storing the result is also terrible from a security standpoint and there is again no excuse for doing this. Standard practice on, say, a Linux password DB is to first add a fairly big random salt then run it through the hashing algorithm a few thousand times. Not only does the number of rounds of hashing make it harder to construct rainbow tables to a degree (if you set a custom value, since the attacker wouldn't know the number) but it greatly slows down the speed of either an exhaustive key search or rainbow table construction even if the variables are known - 1000 rounds of hashing will, in theory, make an attack take 1000 times as long.

  9. #25
    Registered+
    Join Date
    Feb 2010
    Location
    North East England.
    Posts
    64
    Thanks
    23
    Thanked
    2 times in 2 posts

    Re: News - Sony pictures loses 1,000,000 passwords

    I'm with you Whiternoise,

    I needed to speak to a Motherboard Company to ask them how to stop their helpful (sic) MB Software from wasting my time offering me services that I didn't want at every Boot-Up. {By which most of you will have guessed which company.}

    They demanded I fill out a questionnaire of personal details, before allowing me through to ask the question.

    Leaving the fields blank, produced error messages, and no progress.

    However, giving an address on the Moon, my birth-date somewhere in the middle of the Nineteenth Century and my favourite colour as Yesterday etc. etc. worked fine, I got through and got my question answered.

    Sorry this is nearly a year on from the last post, but I've only just found it.

    Regards,

    Petra.

Page 2 of 2 FirstFirst 12

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •