Register a SA Forums Account here!
JOINING THE SA FORUMS WILL REMOVE THIS BIG AD, THE ANNOYING UNDERLINED ADS, AND STUPID INTERSTITIAL ADS!!!

You can: log in, read the tech support FAQ, or request your lost password. This dumb message (and those ads) will appear on every screen until you register! Get rid of this crap by registering your own SA Forums Account and joining roughly 150,000 Goons, for the one-time price of $9.95! We charge money because it costs us money per month for bills, and since we don't believe in showing ads to our users, we try to make the money back through forum registrations.
 
  • Post
  • Reply
post hole digger
Mar 21, 2011


I thought iMessage backups in iCloud specifically were not encrypted.

Adbot
ADBOT LOVES YOU

Soricidus
Oct 21, 2010
freedom-hating statist shill

Ansible Adams posted:

I thought iMessage backups in iCloud specifically were not encrypted.

no, they are still encrypted

and the key is in the backup too

HELLOMYNAMEIS___
Dec 30, 2007

https://twitter.com/j0nh4t/status/1429049506021138437

the panacea
May 10, 2008

:10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux::10bux:

I didn't think the NSA plants would be that obvious

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.



lol nice

we use some wonky home rolled session RDP wrapper for access to database servers and it gives you local admin on the host so you can pop an elevated command prompt by going to the save as menu even if you're logged on with what should be a read only account

I've raised this like 4 times

Shaggar
Apr 26, 2006

delivering whql certified drivers via windows is great, but maybe dont include the totally untested support software with it.

pseudorandom name
May 6, 2007

but how will the mouse company provide the value-added service of spying on the browsing habits of their customers?

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.


on the subject of "caught you jacking off" blackmail spam and some weird 'emails my browsing history to my wife to stop me jacking it software called 'covenant eyes'", a gift!

BaseballPCHiker posted:

I had an encounter with Covenant Eyes at my job as an InfoSec guy.

Basically some dipshit had installed it on his work computer and had it running for about 3 years before we noticed it. It had been randomly taking screenshots of his work computer and sending the images to his pastor. Meaning confidential client data was routinely being shared to a 3rd party.

I handed off the case to our privacy team but last I heard, the guy was looking at forking over a 6 figure sum in fines that our company was going to have to pay to keep his job, on top of having all of his clients notified of a data breach.

Achmed Jones
Oct 16, 2004



lol a guy asked to install that software on his work computer at oldjob. i said no.

spiritual bypass
Feb 19, 2008

Grimey Drawer
please stop kink shaming

RFC2324
Jun 7, 2012

http 418

I feel like mentioning that we actively filter porn at work should counter that, and adding that being found getting around those filters is a firing would drive it home

4lokos basilisk
Jul 17, 2008


just get a burner phone plan for your office porn habit jeez

Powerful Two-Hander
Mar 10, 2004

Mods please change my name to "Tooter Skeleton" TIA.


RFC2324 posted:

I feel like mentioning that we actively filter porn at work should counter that, and adding that being found getting around those filters is a firing would drive it home

sounds like an element of added risk to me! :awesome:

Pile Of Garbage
May 28, 2007



i thought God was omnipotent? how to they rationalise this lol

Jabor
Jul 16, 2010

#1 Loser at SpaceChem
your children dying of easily-preventable diseases is something god did deliberately to test you

no they don't actually care what the children dying of easily-preventable diseases think, they don't have any agency within the religious power structure so their opinions don't matter

Soricidus
Oct 21, 2010
freedom-hating statist shill
children are a bunch of scroungers anyway. if they want to be good for anything but dying to test their parents faith then they should get a Job

flakeloaf
Feb 26, 2003

Still better than android clock

c bank s: still poo poo

CBC posted:


An Ottawa woman has lost $23,000 of her life savings after her family says fraudsters gained access to her personal bank account and transferred money through a series of bogus transactions.

Nazma Sayeeda Yousuf, 66, has banked with Bank of Montreal (BMO) for 38 years, during which time she never set up online banking, instead relying on monthly paper statements and in-person trips to the branch on Prince of Wales Drive.

The saga began March 16 when a caller impersonating Yousuf called BMO's contact centre to reset a "forgotten" PIN and set up online banking. The person provided her debit card number and answered security questions satisfactorily, thereby gaining access to her account.

The questions were:

Where was the account opened?
What kind of BMO products do you have?
Name one direct deposit received in the past 30 days.

The BMO phone agent provided the caller with an online banking password and helped reset the account's debit card PIN. A PIN change was completed shortly after at an ATM in Montreal — a two-hour drive from where the Yousufs live — but no cash was withdrawn.

The family suspects this transaction was done with a copied card because they say Yousuf's debit card never left her possession and she hadn't travelled outside Ottawa. BMO says it has ruled out the possibility of a duplicate card, though it hasn't explained how. The employee conceded the telephone agent who spoke to the impersonator didn't follow bank procedure by granting both a PIN change and an online banking setup during the same call. The employee said the bank considers this a "red flag situation," and the phone agent shouldn't have processed both requests.

"There's a lot of fault that happened by the employee that took that call and that's being taken care [of] on our end," the BMO employee said in the recording.

The employee also said camera footage showed a male conducting the Montreal ATM transaction.

"Although I can't get into all of the particulars of our internal review, it was confirmed that the card has not left your possession and legitimate transactions took place during the same timeframe as the reported unauthorized transactions which do not follow a specific fraud pattern," the email said.

"Due to the inconsistent information obtained during our review, we are unable to offer reimbursement for the disputed transactions."


"We cannot conclude at this point that you have been the victim of fraud by a third party," the letter read.

Agile Vector
May 21, 2007

scrum bored



Penisface posted:

just get a burner phone plan for your office porn habit jeez



flakeloaf posted:

c bank s: still poo poo

these are the absolute worst kyc questions I've ever seen. a single statement in the mail can crack the whole account open which is just :stare:

i thought there was a better baseline for these. that must be a stateside requirement so nope no reason to see any value there

edit: i should say, since the bank is neighboring the u.s. i would have expected some bleed-over of stateside kyc practices since they may do banking across the border, but that's not the case here

Agile Vector fucked around with this message at 13:27 on Aug 24, 2021

Rufus Ping
Dec 27, 2006





I'm a Friend of Rodney Nano
Don't understand how the scammer circumvented chip and pin???

flakeloaf
Feb 26, 2003

Still better than android clock

they stole the pin during the catfish call but yeah, even if you have hte means to clone cards you still need to know what to write to them?

Pile Of Garbage
May 28, 2007



my bank (Bankwest, an aussie bank) makes you use your PAN (Personal Access Number) as your username to login to internet banking. said PAN is an eight-digit number printed on your debit and credit cards...

they do have MFA, although not at login and only when you go to do important stuff like add a new pay-anybody (EFT) recipient or raise your withdrawl/online transfer limit. also it's SMS only (no TOTP or push).

last time i called em out on twitter they did a multi-tweet reply using a third-party service that meant i was supposed to click a link in their tweet to see the other ~72 characters they were sending me jfc fuckin banks!

Midjack
Dec 24, 2007



Pile Of Garbage posted:

i thought God was omnipotent? how to they rationalise this lol

i posted this in the bwm thread when it came up:

Midjack posted:

There are some Protestant churches that lean really hard into "accountability" where you're supposed to be in a small group with some other people of your gender (but it's mostly for dudes) and tell each other about what you struggle with. The idea is that it's easier to overcome whatever is bringing you down in a group with people backing you up. Kind of like Catholic confession I guess, just that instead of one person knowing your dirty laundry you have half a dozen people in on it. Unsurprisingly porn is a really common complaint, and software like that sits on your box, monitors your DNS requests, and tattles on you to your church group when you're looking at butts on the internet. The shame is supposed to inhibit the behavior but they aren't hard to get around. Basically it's rebranding of the internet blocklists marketed to parents, it just emails a different group of people.

the one being described is a little different since it's emailing screenshots out rather than just tattling on your dns requests.

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice
this keeps happening and the stance of banks in canada seems to be that chip and pin is "uncrackable" so if fraud happens it must be because you shared your card and pin:

https://www.cbc.ca/news/business/pin-fraud-customer-liable-rbc-surveillance-1.5444554
https://www.thestar.com/business/personal_finance/spending_saving/2011/06/18/roseman_man_sues_cibc_for_81276_visa_charge.html

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice
this is why i won't use services like mint either, btw. canadian banks will absolutely tell you to pound sand if you share your pin or credentials

mystes
May 31, 2006

Cold on a Cob posted:

this keeps happening and the stance of banks in canada seems to be that chip and pin is "uncrackable" so if fraud happens it must be because you shared your card and pin:
If you're the victim of some novel vulnerability (that might not even be in the actual chip or anything, it could just be in the bank's system or something) you're truly hosed for this reason. Before in the UK a lot of people were the victim of an attack that used a device sandwiched between a card and the reader to downgrade stolen cards to chip + signature and the banks didn't even give a poo poo or want to look into it because they could just refuse to refund the money. They just said the same thing: it's uncrackable so the accountholder must have told the attacker their pin and therefore authorized the translation, so it's impossible that a stolen card was used to complete a transaction.

hobbesmaster
Jan 28, 2008

Pile Of Garbage posted:

got a new QNAP NAS and just been setting it up, was amused to find that it defaulted to plain HTTP for the login page unless you tick a "Secure Login" checkbox which redirects you to HTTPS. also found that this was enabled by default, lmao (device is running latest QuTS firmware):



as someone that works for a company that makes network appliances with a web interface the lack of https is so you can actually log into it in the first place. modern browsers are increasingly making it difficult to find the “proceed to insecure page” display you’d get with a self signed or mismatched cert so the initial provisioning is significantly easier for everyone involved if http is used instead of https. after initial login you have to secure the device yourself based on your own security posture and the device’s settings.

30 TO 50 FERAL HOG
Mar 2, 2005



Rufus Ping posted:

Don't understand how the scammer circumvented chip and pin???

[everyone in yospos after years and years of this thread and touching computers in general] there is no such thing as unhackable, everything is vulnerable
[also yospos posters] how did someone bypass the security measures on this lovely chip designed and manufactured by the lowest bidder at the request of an industry that limits maximum password length and still uses 4 digit PINs

Pile Of Garbage
May 28, 2007



hobbesmaster posted:

as someone that works for a company that makes network appliances with a web interface the lack of https is so you can actually log into it in the first place. modern browsers are increasingly making it difficult to find the “proceed to insecure page” display you’d get with a self signed or mismatched cert so the initial provisioning is significantly easier for everyone involved if http is used instead of https. after initial login you have to secure the device yourself based on your own security posture and the device’s settings.

i don't ever recall any browser fully breaking self-signed certs for HTTPS, nor do i recall them making it more difficult to navigate to HTTPS sites with self-signed certs beyond adding an extra click (which it then caches and remembers anyway). also this thing advertised plain HTTP on 8080 and if that's a way to get around browser whinging then that's just cooked.

Shame Boy
Mar 2, 2010

if it's a consumer device, training users to regularly click past a cert warning as part of a normal setup process seems Bad

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.

30 TO 50 FERAL HOG posted:

[everyone in yospos after years and years of this thread and touching computers in general] there is no such thing as unhackable, everything is vulnerable
[also yospos posters] how did someone bypass the security measures on this lovely chip designed and manufactured by the lowest bidder at the request of an industry that limits maximum password length and still uses 4 digit PINs

oh, we have six digit pins now

Cold on a Cob
Feb 6, 2006

i've seen so much, i'm going blind
and i'm brain dead virtually

College Slice
one of my bank accounts only lets me use a 6 digit numeric pin

to sign in online

ityool 2021

(tangerine.ca for the curious)

flakeloaf
Feb 26, 2003

Still better than android clock

i thought their "what did you call this picture" mfa was actually pretty good, not sure why they canned it in favour of sms 2fa of all things

microsoft authenticator's been out for five years already, yall have no excuse at this point

infernal machines
Oct 11, 2012

we monitor many frequencies. we listen always. came a voice, out of the babel of tongues, speaking to us. it played us a mighty dub.
td still wants to send me a text message any time i sign in from my desktop

Fart Sandwiches
Apr 4, 2006

i never asked for this
my work phone with my work authenticator is packed up from a recent move so to log in to teams they just let me click “give me a call” and I just pressed # and was logged in. seems legit

hobbesmaster
Jan 28, 2008

Pile Of Garbage posted:

i don't ever recall any browser fully breaking self-signed certs for HTTPS, nor do i recall them making it more difficult to navigate to HTTPS sites with self-signed certs beyond adding an extra click (which it then caches and remembers anyway). also this thing advertised plain HTTP on 8080 and if that's a way to get around browser whinging then that's just cooked.

why do you need https if you're configuring it from a direct connection from a laptop

if you're doing anything else why do you think it is in any way secure if there was a broken padlock in your browser window

Pile Of Garbage
May 28, 2007



hobbesmaster posted:

why do you need https if you're configuring it from a direct connection from a laptop

if you're doing anything else why do you think it is in any way secure if there was a broken padlock in your browser window

i really don't feel like i need to explain myself when a bunch of other vendors only do HTTPS by default (ok maybe not a bunch but Fortinet deffo do).

Pile Of Garbage
May 28, 2007



in fact why am i defending HTTPS as a default lmao

Munkeymon
Aug 14, 2003

Motherfucker's got an
armor-piercing crowbar! Rigoddamndicu𝜆ous.



Pile Of Garbage posted:

nor do i recall them making it more difficult to navigate to HTTPS sites with self-signed certs beyond adding an extra click (which it then caches and remembers anyway)

then your memory isn't very good. the thing to click on has gotten consistently easier to miss over the years because most people shouldn't be clicking on it most of the time. it's good design unless you're a normal person trying to set up a network appliance

hobbesmaster
Jan 28, 2008

Pile Of Garbage posted:

in fact why am i defending HTTPS as a default lmao

because what is https to 192.168.1.1 presenting a certificate for CHANGEME.example.com actually proving?

hobbesmaster fucked around with this message at 16:03 on Aug 24, 2021

Adbot
ADBOT LOVES YOU

Pile Of Garbage
May 28, 2007



ya'll are mainly right, HTTPS without validation is meaningless, also the end-user impact is bad i guess.

my QNAP supports exposing itself not just on WAN but via QNAP cloud services. it even supports ACME and can issues its own certs via LE. it wanted me to set it up via a QR code that i would scan and it assumed my unit would have full internet access (lol yeah right).

but idk a lot of this is done well.

that said everyone just kinda ignored my main thing:

Pile Of Garbage posted:

also found that this was enabled by default, lmao (device is running latest QuTS firmware):


  • 1
  • 2
  • 3
  • 4
  • 5
  • Post
  • Reply