Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple: Stolen Celeb Nudes Were Result Of Good Guessing, Not Data Breach
Consumerist ^ | September 2, 2014

Posted on 09/02/2014 3:42:43 PM PDT by SMGFan

click here to read article


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-105 next last
To: driftdiver

I admit I have no idea what iCloud is, this is the first time I’ve heard of it, I do not know what it’s intended purpose is; however, if it is intended to store any type of sensitive data the vendor is really doing it wrong.

This is how I approached my argument, that my assumption is it is some type of online backup service or WAN-NAS. In either case, the security-minded approach is to provide a client-side application that encrypts data with a client-private key that the server will never know. The API is simply “Server, store this in block #123”. Server responds, “okay, looks like line noise but you’re the boss.” Client later goes, “server, give me block #123.” Server responds, “here you go client, I sure hope to hell you know what this is because I have no idea.”

Once the service is doing anything with plaintext the whole chain of security breaks down, therefore the service can never see plaintext. With this approach there is no need for a server account other than for billing purposes. I could request all of JLaw’s blocks and still have no idea what they are unless I had NSA-level gear and a strong desire.


61 posted on 09/02/2014 6:15:48 PM PDT by John Robinson (HTML::Parse: Skipping unknown tag sarcasm)
[ Post Reply | Private Reply | To 55 | View Replies]

To: RIghtwardHo

>> “biometrics of all kinds as the technology is perfected.” <<

.
Yes, you have already established that you are a fan of the beast.
.


62 posted on 09/02/2014 6:17:15 PM PDT by editor-surveyor (Freepers: Not as smart as I'd hoped they'd be)
[ Post Reply | Private Reply | To 11 | View Replies]

To: John Robinson

(Little herderp, needs some type of security so that user’s don’t overwrite each other’s data, but that’s a different issue and isn’t as big of a breach as losing propriety of your data.)


63 posted on 09/02/2014 6:19:39 PM PDT by John Robinson (HTML::Parse: Skipping unknown tag sarcasm)
[ Post Reply | Private Reply | To 61 | View Replies]

To: DBrow; gunsequalfreedom

“Don’t blame the victims of their own stupidity!”
.


64 posted on 09/02/2014 6:21:05 PM PDT by editor-surveyor (Freepers: Not as smart as I'd hoped they'd be)
[ Post Reply | Private Reply | To 42 | View Replies]

To: batterycommander

Honestly, the pix are just pretty mundane photos teen-20-something young women send to their boyfriends these days. They clearly aren’t blackmail photos, just pix sent to distant lovers, bawdy moments and occasionally some pretty anonymous sexual mechanics.

If the women involved weren’t famous, no one would even notice these photos among the millions of naked photos on the internet of women posing in mirrors holding their phones blocking part of their face.

It is reflective of our society normalizing the idea of sending naked selfies to lovers rather than any archaic idea of blackmailing women with nude photos.


65 posted on 09/02/2014 6:26:29 PM PDT by MediaMole
[ Post Reply | Private Reply | To 14 | View Replies]

To: editor-surveyor

If I hacked FR and took some members’ private messages and made them all public, that would be the member’s fault first, then FR’s security system, right?

Not my fault.


66 posted on 09/02/2014 6:32:33 PM PDT by DBrow
[ Post Reply | Private Reply | To 64 | View Replies]

To: Drew68

Couldn’t tell by me. I don’t follow Hollywood much, had never heard of her before.


67 posted on 09/02/2014 6:34:17 PM PDT by nascarnation (Toxic Baraq Syndrome: hopefully infecting a Dem candidate near you)
[ Post Reply | Private Reply | To 60 | View Replies]

To: LibertyOh

I give bogus answers to those.


68 posted on 09/02/2014 6:41:38 PM PDT by wally_bert (There are no winners in a game of losers. I'm Tommy Joyce, welcome to the Oriental Lounge.q)
[ Post Reply | Private Reply | To 43 | View Replies]

To: LibertyOh
My understanding is that Apple allows one to recover their userid and/or password by answering a few security questions. Let’s see - mother’s maiden name, pet, ... - all likely publicly available

It should be taught in elementary school: Lie about that information, but make sure you can remember or locate a backup of those lies.

69 posted on 09/02/2014 7:19:51 PM PDT by TChad (The Obamacare motto: Dulce et decorum est pro patria mori.)
[ Post Reply | Private Reply | To 43 | View Replies]

To: eyeamok
Why anybody would give a damn about a bunch of whiny hypocrite jesters is beyond me.

This story isn't about them. It's about privacy. With them it's their lame pictures. With you or someone else it could be financial information.

70 posted on 09/02/2014 7:23:29 PM PDT by Lizavetta
[ Post Reply | Private Reply | To 27 | View Replies]

To: MediaMole

I guess I’m from another century. I did not realize the extent of this practice. My cell phone is ancient and has no capability to photograph. Have all the young women turned into sluts? Is promiscuity now common? Are there any nuns left? I guess it went down hill when our priests started diddling the young children. G-d help us.


71 posted on 09/02/2014 7:38:05 PM PDT by batterycommander
[ Post Reply | Private Reply | To 65 | View Replies]

To: babygene
10 is way to few. A hacker is not going to “brute force” a password with 100 tries.

Right, but anyone failing 10 times, with a warning, should be locked out until the secondary verification is done. No one needs more than 10 tries, and anyone trying more than that is usually up to no good. If you forget the password, hit the link for resetting the password. Brute force might require millions of tries, true; however someone using social engineering (family info, birthdays, phone numbers, etc.) might guess after 20 or 30 tries. Some systems only allow 4 or 5 mistakes--financial places usually. That is smart.

72 posted on 09/02/2014 7:40:31 PM PDT by Defiant (4 main US grps: conservatives, useless idiots (aka RINOs), marxists and useful idiots (aka liberals))
[ Post Reply | Private Reply | To 35 | View Replies]

To: batterycommander

I guess that’s why the muzzies hate us so. They don’t put up with this promiscuity at all. They cut off heads and other members for even showing your ankle.


73 posted on 09/02/2014 7:48:47 PM PDT by batterycommander
[ Post Reply | Private Reply | To 71 | View Replies]

To: RIghtwardHo
Passwords are ridiculous. We should go to fingerprints, eye scans, voice ... biometrics of all kinds as the technology is perfected.

We should go to hanging hackers in the public square. Keep a webcam on them until the crows & maggots are through with the remains.

On a less violent and vengeful note, perhaps Symantec should offer a "Norton 360 Payback" version. The main feature being the option of "You steal my data, you also get an embedded virus/Trojan/worm that will absolutely FRY your computer & LAN".

74 posted on 09/02/2014 7:53:23 PM PDT by BwanaNdege ( "Our Emperor may have no clothes, but doesn't he have a wonderful tan" - MSM)
[ Post Reply | Private Reply | To 11 | View Replies]

To: Defiant
If I understand what happened correctly, they were able to get the codes because Apple doesn’t lock out a person after a certain number of incorrect attempts are made to guess the password. So, you can try to get on using one of the millions of easy passwords that people typically use, and try endlessly until one works. That, if true, is a very bad flaw in a system that contains very private data online. It should lock a user out after 10 attempts or so.

No, the Apple does lock you out after five attempts. What was done using the "I forgot my password" reset system where the user is allowed to change passwords by answering security questions. For most people, this is safe. Not so for celebrities. It is easy to learn, for example, the answer to "What was the make of your first car?” from reading fan magazine bios of the celebrity, where pictures from their early life are shown. Other questions like "Where did your parents meet?" are often included in such articles that fans read. For the rest of us nobodies, those are unknowables.

Apple investigated and discovered that all of the compromised accounts had their passwords changed in the past week. There was no brute force invasion, just research. . . and NONE of the celebrities used Apple's recommended two-factor security requirement to access their account which would have prevented this.

75 posted on 09/02/2014 8:00:51 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies]

To: SMGFan
Well, the celebrity accounts were breached NOT by hacking but by good research. The hacker used "I forgot my password" to reset the celebrity user's password by answering her security questions. For most of us, these are a good way to provide a secure way to let us get in but not so for celebrities. No one will be able to easily learn the answers to "Where did your parents meet?" or "What was the first car you owned?" for us nobodies, but for celebrities, the answers to these questions can be often found in fan magazine biographies.

The "hacker," it turns out, merely went in, claiming he was the celebrity who had forgotten her password, answered the simple security questions, and changed the password. . . and downloaded the photos and videos. Had these celebrities used Apple's recommended two-factor authentication, it could not have happened because the women would have been contacted before the hacker could get any farther. . . but they did not use it. Every celebrity that was compromised had her password changed.—PING


Apple iCloud Hollywood Hack Answer Ping!

If you want on or off the Mac Ping List, Freepmail me.

76 posted on 09/02/2014 8:17:42 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Defiant
If I understand what happened correctly, they were able to get the codes because Apple doesn’t lock out a person after a certain number of incorrect attempts are made to guess the password.

I don't think that's the case. You get several tries, then you need to reset your password via link in your email. The situation is that these vacuous stars use weak passwords, or no password at all. The "hackers" used an attack hunting for accounts that used nonexistent, simple or default passwords such as "password". I've helped people by fixing their computers, and am astounded at how many use the default login ID and default password present from opening a new computer. Same goes for Internet use; many can't be bothered with a "complex" password and resort to using "password" or "1111" or some variant.

77 posted on 09/02/2014 8:17:57 PM PDT by roadcat
[ Post Reply | Private Reply | To 8 | View Replies]

To: Ainast
Apple requires a very complex password. Must have been a helluva brute force attack.

Turns out it wasn't a brute force attack. . . it was finessing the security questions by researching the celebrities and knowing what the answer was. . . then changing her password.

78 posted on 09/02/2014 8:20:48 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker

Thanks for clearing that up.


79 posted on 09/02/2014 8:33:31 PM PDT by Defiant (4 main US grps: conservatives, useless idiots (aka RINOs), marxists and useful idiots (aka liberals))
[ Post Reply | Private Reply | To 75 | View Replies]

To: John Robinson

John, it is encrypted. First by the user at 128bit, then by Apple to an additional 256bits on top of that after being anonymized in storage. BUT, accessing your data with a password decrypts the data so the user can access it.

What occurred here is that a “hacker” used research into the celebrities to be able to answer their security questions and change their passwords. Security questions that would work fine for average people are not useful for people whose lives are lived under microscopes and chronicled in Fanzines. Every one of the compromised celebrities’ accounts had their passwords changed in the past week. . . by someone other than the owner who correctly answered the questions.

Had these women used Apple’s recommended two-factor security, the hacker would have been stopped in his tracks. Unfortunately, they opted to not be bothered with that.


80 posted on 09/02/2014 8:34:06 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 47 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-105 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson