PSA: Amazingly good security

Apr 7, 2018 11:15 PM

AmILateToTheParty

Views

103513

Likes

1803

Dislikes

29

tl;dr T-Mobile Austria stores user passwords not in an encrypted form. Source: https://twitter.com/tmobileat/status/981418339653300224

The rush started at who could prove them wrong first

FP Edit: Send software gore

PHP 5.1???

8 years ago | Likes 1 Dislikes 0

Käthe's first response is the most unprofessional thing I've ever heard from a company representative, what a stupid bitch.

8 years ago | Likes 8 Dislikes 2

July 13 2011. Beautiful.

8 years ago | Likes 197 Dislikes 0

Wow... just wow.

8 years ago | Likes 3 Dislikes 0

Can someone explain this for the laymen?

8 years ago | Likes 1 Dislikes 0

Reminds me when some cyber security CEO made fun of 4chan and got royally screwed both personally and his business

8 years ago | Likes 3 Dislikes 0

Or the one whose company was selling identity theft protection, so he put his name and SSN in his ads.....and had his identity stolen.

8 years ago | Likes 3 Dislikes 0

Poor Social Media Intern

8 years ago | Likes 1 Dislikes 0

Who cares? Its austri. Germanys way more right wing neighbour.

8 years ago | Likes 1 Dislikes 0

Do you want to get hacked? Because this is how you get hacked.

8 years ago | Likes 2 Dislikes 0

Nobody in Austria named käthe, blame Germany for that!

8 years ago | Likes 1 Dislikes 0

I bet none of you can put millions of money into my bank account. My I have the best security in the world. 100%

8 years ago | Likes 1 Dislikes 0

Can someone explain to me what happened as if I were a somewhat precocious 8 year old?

8 years ago | Likes 6 Dislikes 2

[deleted]

[deleted]

8 years ago (deleted Oct 21, 2024 11:28 PM) | Likes 0 Dislikes 0

Thank you.

8 years ago | Likes 2 Dislikes 0

*looks at his t-mobile phone* Panic Intensifies.

8 years ago | Likes 2 Dislikes 0

....so what happened next?

8 years ago | Likes 20 Dislikes 1

Probably the guy who runs the T mobile twitter got fired and not much else.

8 years ago | Likes 28 Dislikes 0

Wrong approach. The right one is to fix the database.

8 years ago | Likes 4 Dislikes 1

Corporations like t-mobile don't give a single solitary fuck about security because most people don't think about it.

8 years ago | Likes 4 Dislikes 0

Someone gonna lose their job....

8 years ago | Likes 3 Dislikes 0

Imgur is giving me an ad for TMobile...

8 years ago | Likes 4 Dislikes 0

Run

8 years ago | Likes 3 Dislikes 0

Oh jesus fuck, 5.1.6? That's got the PHP CGI injection bug. You can literally gain shell access with that.

8 years ago | Likes 15 Dislikes 0

Whoever that PR person is for Tmobile I can guarantee is fired. You challenge the internet, you get wrecked. Every time.

8 years ago | Likes 2 Dislikes 0

Stating you're even difficult to hack can be a death sentence for a company.

8 years ago | Likes 710 Dislikes 0

Of course. Its a challenge at that point

8 years ago | Likes 15 Dislikes 0

Exactly, and that hasn't worked out well for the boast worthy (for the most part).

8 years ago | Likes 2 Dislikes 0

Yep, it's like saying, "I'M INVINCIBLE!" (and/or UNSTOPPABLE)

8 years ago | Likes 1 Dislikes 0

"You're a loony."

8 years ago | Likes 5 Dislikes 0

Nothing can be coded that cannot be uncoded. It's that simple.

8 years ago | Likes 11 Dislikes 1

You can, but it's expensive. I'd read up on "formal verification" and how it's starting to be applied in DARPA.

8 years ago | Likes 1 Dislikes 0

exactly. All it takes is finding the key, one way or another. We've known this since the Enigma code.

8 years ago | Likes 3 Dislikes 0

Kathe shouldn't be online with that attitude.

8 years ago | Likes 22 Dislikes 0

Käthe thinks she's Wendy, evidently.

8 years ago | Likes 2 Dislikes 0

Well I give them a month till a big leak of users passwords

8 years ago | Likes 2 Dislikes 0

Ashley Madison just weighed in...if they are comfortable making fun of you, you've got a problem

8 years ago | Likes 3 Dislikes 0

Exactly. If you're so confident that your system is unhackable, 1) It isn't. 2) Time to get an external auditor to break in and show you

8 years ago | Likes 2 Dislikes 0

your system's deficiencies. 3) Regular testing and patching. "Awwww, that all sounds expensive. " Maybe they have insurance

8 years ago | Likes 2 Dislikes 0

against stuff like this, so they just say they'll rely on that. That, and you've got shit like forced arbitration in T&C documents, saying

8 years ago | Likes 2 Dislikes 0

that if you do business with a company, you can't sue them in court or take part in class actions, and apparently that sort of thing is

8 years ago | Likes 2 Dislikes 0

This is why companies who care about security hire security firms to hack and patch their systems.

8 years ago | Likes 23 Dislikes 0

They're called Pen-Testers, red and blue teams.

8 years ago | Likes 7 Dislikes 0

Never challenge the internet to do anything.

8 years ago | Likes 668 Dislikes 1

Ah, the Lord British Postulate. If it is declared impossible, the Internet will find a way.

8 years ago | Likes 1 Dislikes 0

The internet better not make me happy and wealthy

8 years ago | Likes 20 Dislikes 0

Yeah if they even try I will fuck em up I bet theyre too chiken

8 years ago | Likes 4 Dislikes 0

Especially not when there's trained security experts on twitter that WILL break down the pathetic arugments for storing passwords in plain

8 years ago | Likes 1 Dislikes 0

Hey Internet, I bet you can't get me laid!

8 years ago | Likes 1 Dislikes 0

This isn't even a challenge, goddammit, someone with a few months of experience could go around those "safety measures".

8 years ago | Likes 2 Dislikes 0

not even if it is to make me legally rich?

8 years ago | Likes 40 Dislikes 0

The internet can't pay off my $24k of debt...

8 years ago | Likes 10 Dislikes 0

I mean, it totally can...

8 years ago | Likes 4 Dislikes 0

Yeah but they'd have to send some of that internet money

8 years ago | Likes 1 Dislikes 0

Oh was that you challenging it?

8 years ago | Likes 3 Dislikes 0

I'm sorry I'm not the most not tired right now

8 years ago | Likes 1 Dislikes 0

Passwords shouldn't even be stored in an encrypted form but only as an irreversible cryptographic hash.

8 years ago | Likes 7 Dislikes 0

But how will the customer representative know your password then?

8 years ago | Likes 2 Dislikes 0

Should I take that as a joke or a question?

8 years ago | Likes 2 Dislikes 0

8 years ago | Likes 1 Dislikes 0

If permissions have been properly set, the rep doesn't have to know your password to do his job. Your password is for you and for you alone.

8 years ago | Likes 1 Dislikes 0

That way even if the database gets hacked, all the hacker would ever be able to see is gibberish instead of your password.

8 years ago | Likes 1 Dislikes 0

With a salted hash on each password.

8 years ago | Likes 7 Dislikes 0

As an IT guy this gave me an heart attack.

8 years ago | Likes 500 Dislikes 0

a*

8 years ago | Likes 2 Dislikes 1

Why would you fucking challenge the internet to hack you?

8 years ago | Likes 51 Dislikes 0

Same. Never using TMobile for ANYTHING

8 years ago | Likes 2 Dislikes 0

As a grammar nazi you gave me an headache AUGH!

8 years ago | Likes 6 Dislikes 7

i guarantee the net admin was ready to murder the tmobile social media rep.

8 years ago | Likes 180 Dislikes 1

oh, and by 'ready' i mean had a plan, a weapon and a place to dump the body

8 years ago | Likes 2 Dislikes 0

I have a webshop, we use PayPal to avoid all this. They take 4% but i think its worth it.

8 years ago | Likes 3 Dislikes 0

not hosting cardholder data is definitely worth 4%, but tmobile has user account data regardless. not feasible for them.

8 years ago | Likes 3 Dislikes 0

Odd thing is people call to pay over the phone, they dont 'trust online'. They tell me, a stranger, their numbers. People huh

8 years ago | Likes 2 Dislikes 0

old people, i assume. but yeah, fuck if i'm givin out my shit unsecured

8 years ago | Likes 1 Dislikes 0

Aren't passwords usually encrypted even to admin? That's why they can't tell you your password, only let you make a new one. Also WTF is 1/2

8 years ago | Likes 7 Dislikes 0

Passwords should not be recoverable by anyone, which is why all good login systems only allow you to change it, not to retrieve it

8 years ago | Likes 4 Dislikes 1

practice of asking for your password over the phone? Do they even have an IT department?

8 years ago | Likes 9 Dislikes 0

Yeah -- somewhere Kevin Mitnick is laughing hysterically...

8 years ago | Likes 3 Dislikes 0

You should use different passwords for every app/website, it's helpful to use a mnemonic algorithm to generate ones only you can know. :)

8 years ago | Likes 2 Dislikes 0

Yes you should, but nobody does

8 years ago | Likes 1 Dislikes 0

Or use a password manager to store strong passwords

8 years ago | Likes 2 Dislikes 0

@azerbaijan What I love about this stuff is that a few sites now are enforcing *maximum* password lengths. Vanguard does this, I think they

8 years ago | Likes 1 Dislikes 0

are at a max of 12 or 14 characters, and Wells Fargo also allows a maximum of 14 characters now. I understand a minimum length, but a

8 years ago | Likes 1 Dislikes 0

maximum seems like it'd discourage strong passwords. Something like DFdsf*&9;df))7()(@#$²∞±fsl3 should be fairly strong, right? The weakness

8 years ago | Likes 1 Dislikes 0

then is that it needs to be stored somewhere.....like an offline encrypted database with a lengthy password.

8 years ago | Likes 1 Dislikes 0

yea max length restrictions are really frustrating. even with appropriate encryption they can be weak to brute force attacks.

8 years ago | Likes 2 Dislikes 0

Can you explain that please?

8 years ago | Likes 3 Dislikes 0

It's a memory trick to basically build the password, use rules for consistency, like for imgur you might do something like...

8 years ago | Likes 1 Dislikes 0

first three letters backwards, add ing to the end, some fancy numbers and a special character. 67gmi$%ing and you apply these rules to all

8 years ago | Likes 2 Dislikes 0

you remember the rules not the password, I've been able to login to my account on websites I didn't even remember signing up for.

8 years ago | Likes 3 Dislikes 0

the more rules you have the more secure it becomes, it can still be broken but not nearly as easily as using the same passwords

8 years ago | Likes 2 Dislikes 0

Wow this was a really good way to explain how it worked. Thanks!

8 years ago | Likes 3 Dislikes 0

I think I'm gonna need an explanation for the techy bit

8 years ago | Likes 125 Dislikes 3

in addition to the lack of encryption, letting users see what versions of linux/php you are using aids attackers immensely.

8 years ago | Likes 5 Dislikes 0

Plain text passwords. Aka "toms password is tomato" written in a text file on their server. Somewhere.

8 years ago | Likes 2 Dislikes 0

Basically your lock smith has a key to every house that he keeps just sitting on his desk in the mall...

8 years ago | Likes 30 Dislikes 0

And the box is labeled "Keys for every house." "But it's ok, because both the front AND back doors are amazingly well-locked."

8 years ago | Likes 4 Dislikes 0

and the address to the house is on the key

8 years ago | Likes 3 Dislikes 0

They done fucked up.

8 years ago | Likes 9 Dislikes 1

They're trying to backdoor the Unix bus to Python the root directory. If that doesn't work they'll piggyback a decryption handshake. >

8 years ago | Likes 5 Dislikes 3

Hacking in Hollywood scripts.

8 years ago | Likes 4 Dislikes 2

Whoever downvoted this is just pissed the can’t manage to hack a Gibson.

8 years ago | Likes 2 Dislikes 0

Cheers uncle

8 years ago | Likes 1 Dislikes 0

Instead of encoding words with a cypher, they keep it written on paper in a locked box . Break the lock (hacking), you have the passwords.

8 years ago | Likes 5 Dislikes 0

"But 'sneaker-net' *can't* be hacked via online protocols!" pleadingdogeyes.gif

8 years ago | Likes 3 Dislikes 0

A password should be hashed. Hashing is a process easy to do from text to hash but hard from hash to text. This way if (1)

8 years ago | Likes 3 Dislikes 0

A hacker gets in they see the stored hash and not the password. When you type in the password the website hashes whatever you typed in (2)

8 years ago | Likes 3 Dislikes 0

And compares the resulting hash with the hash they have stored. That way your password isnt actually stored anywhere, making it safer (3)

8 years ago | Likes 2 Dislikes 0

Instead of that they just stored the password in text, meaning that if someone does hack into the servers they can see all the passwords (4)

8 years ago | Likes 2 Dislikes 0

Normally you make a one-way encrypt, so "mypaawd" gets saved as "g38sj2jdowj..etc" with no "undo". When you come back, we do it again and..

8 years ago | Likes 15 Dislikes 0

Compare the 2 encrypted goobly goop. We never keep the passwords themselves. Moreover, we never keep the username/encrypted pass on the ..

8 years ago | Likes 14 Dislikes 0

Webserver. It's always on a separate, more protected, database server. Never, ever, ever in some CSV file. That's fucking insane.

8 years ago | Likes 15 Dislikes 0

Storing passwords as plaintext on your server is HORRENDOUSLY bad security. Security protocols are also about 7 years out of date. (1/3)

8 years ago | Likes 85 Dislikes 0

I just roll my own crypto solution, it's way more secure.

8 years ago | Likes 3 Dislikes 2

Apparently, so do they: the ROT26 protocol...

8 years ago | Likes 3 Dislikes 0

I prefer the ROT13 Twice method or the substitution cipher with no characters in my key code

8 years ago | Likes 2 Dislikes 0

People have managed to inject code into the website hence the 'only the best security' dialogue. You shouldn't be able to do this. (2/3)

8 years ago | Likes 55 Dislikes 0

Passwords are stored on a server that literally is called 'passwords'. You've just made it that much easier for hackers to locate them(3/3)

8 years ago | Likes 53 Dislikes 1

PR rep obviously has zero cyber security training which shows that in house security protocols are severely lacking (4/whoops)

8 years ago | Likes 48 Dislikes 0

Where is the oversight by regulators? How has this happened? All in all this should be fucking terrifying to people. (5/5)

8 years ago | Likes 42 Dislikes 1

That's just Red Hat Enterprise Linux 6.x, which is fully supported until 2020 and probably is the most deployed Linux version.

8 years ago | Likes 4 Dislikes 0

Red Hat 6.x is usually pretty fine, that's their extended life OS. It's their PHP version that has hackers drooling. Really easy to hack.

8 years ago | Likes 1 Dislikes 0

in any case users shouldn't be able to see any of this.

8 years ago | Likes 3 Dislikes 0

Except their version was last updated in 2011

8 years ago | Likes 6 Dislikes 0

So it's probably 6.2 with patches. Might well be vulnerabilities, or it might be known to be stable / secure for their env. Wouldn't bet :)

8 years ago | Likes 1 Dislikes 0

That MAY be fine for the kernel, but that PHP version is old as shit.

8 years ago | Likes 3 Dislikes 0

Red Hat is just super conservative and won't update the major version of stuff like the kernel during the entire 6.x series, so it's still

8 years ago | Likes 2 Dislikes 0

based on a version that started in 2009! Great for stability (stuff does not break when you up-to-date) but bad for compatibility with

8 years ago | Likes 2 Dislikes 0

modern tools that expect at least kernel 3. It's a real pain today as software developers to support 2009 kernel/glibc API versions.

8 years ago | Likes 2 Dislikes 0

They won’t do a major kernel in six... RHEL7 is the update ;)

8 years ago | Likes 3 Dislikes 0