Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Sunday April 08 2018, @02:07PM   Printer-friendly
from the easier-to-check-that-way dept.

https://www.privateinternetaccess.com/blog/2018/04/another-day-another-breach-at-what-point-does-storing-passwords-in-plaintext-become-criminally-negligent/

The third largest breach ever just happened in Finland. Passwords were stored in plaintext. At T-Mobile Austria, they explain that of course they store the password in plaintext, but they have so good security so it's nothing to worry about. At what point does this become criminally negligent?


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 4, Interesting) by MrGuy on Sunday April 08 2018, @02:59PM (3 children)

    by MrGuy (1007) on Sunday April 08 2018, @02:59PM (#663946)

    I assume the question as asked is referring to legal, not moral, liability. IANAL, so take all this with a grain of salt. I'm also only familiar with the US system of determining liability. That said...

    The problem here is what's legally referred to as an intervening cause. [wikipedia.org] If I do something negligent that could eventually cause injury but would not do so on its own, but then something happens done by someone ELSE that actually causes the injury, I may not be liable because the injury only ACTUALLY occurred because of someone else's action (the "intervening cause").

    In this case, the hacked company may be negligent. The question is whether the action of the hacker breeching the company's server and stealing the actual data is an "intervening act" that absolves the hacked company of liability.

    The key determining factor is whether the eventual injury is "forseeable" - whether the original person could have reasonably forseen the action that actually caused the injury. If you're a technologist, this seems to make it cut and dry - of COURSE getting hacked is a "forseeable" outcome of having a server on the internet. That said, the law is a lot murkier in this case. Because the action of hacker is illegal. It's not clear whether the duty to "forsee" actions extends to illegal activity, especially when you take "reasonable precautions" to prevent illegal activities (this is precisely the argument T-Mobile is making - our security is so good it doesn't matter). Does circumventing "reasonable" or "industry standard" security make the action "unforseeable"?

    Take an example - let's say you're responsible for closing the safe in my office. You negligently leave the safe open. Someone breaks in and robs it. Are you liable?

    If the office doesn't have a good lock, and is in a building that's open to the public, then someone breaking into my office is probably "forseeable." Sure, the robber had to illegally enter the office to commit the robbery But you were negligent and you really should have anticipated someone else getting into the office and robbing the safe.

    Now consider if your office is in a locked building, with a security guard in the lobby that checks people into and out of the building. There are cameras everywhere. The office has a steel reinforced door, with a high-tech lock. It turns out the burglars forged ID credentials to the building, disabled the security cameras remotely, and had broken into the lock company's server to get the design of a duplicate key. This makes the break-in considerably less "forseeable" - my actions might have been negligent, but I couldn't reasonably have anticipated that someone could break through all the security, so my negligence in leaving the safe open is probably negated by the "intervening act" of the high-tech robbery.

    The open and unsettled question is where the bar is - how much can companies hide behind "Those crafty hackers defeated state-of-the-industry security measures to get the data!" vs. "Oops - we left the equivalent of the front door open."

    Starting Score:    1  point
    Moderation   +2  
       Interesting=2, Total=2
    Extra 'Interesting' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   4  
  • (Score: 3, Insightful) by requerdanos on Sunday April 08 2018, @04:19PM

    by requerdanos (5997) Subscriber Badge on Sunday April 08 2018, @04:19PM (#663978) Journal

    The key determining factor is whether the eventual injury is "forseeable" - whether the original person could have reasonably forseen the action that actually caused the injury.

    In the case of either...

    • a valet parking service that leaves the keys in all the cars in a poorly guarded lot that they call "The Most Secure Lot Protecting Your Car In The Known Freaking Universe", or
    • a data service that stores your passwords in plaintext in a poorly guarded database they call "The Most Secure Database Protecting Your Data In The Known Freaking Universe",

    not only could the original person have forseen the action, but so could have a blind, syphilitic monkey [bmj.com].

  • (Score: 3, Informative) by darkfeline on Sunday April 08 2018, @10:32PM (1 child)

    by darkfeline (1030) on Sunday April 08 2018, @10:32PM (#664074) Homepage

    The thing is, hashing passwords is so easy and is such a basic security practice that not doing so is a clear failure to take "reasonable precautions".

    Also, breaches happen so often (literally every other day) that of course it is a "foreseeable" event. It happens much more often than, say, people getting killed by unprotected high voltage wires, it's much easier to protect against via hashing/salting, it affects millions/billions time as many people when it happens, and somehow failure to take reasonable security precautions is not gross negligence?

    I'm not saying that this is how the law will be interpreted "de facto", but rather how the law should be interpreted "de jure" in the spirit of the law by anyone with (not so) common sense.

    --
    Join the SDF Public Access UNIX System today!
    • (Score: 0) by Anonymous Coward on Monday April 09 2018, @10:45AM

      by Anonymous Coward on Monday April 09 2018, @10:45AM (#664347)

      The thing is, hashing passwords is so easy and is such a basic security practice that not doing so is a clear failure to take "reasonable precautions".

      But how else would you have "cleaver" security systems, like tell you that you have used part of the password before, going months? And then tell you to update your password every 3 months?

      Yes, the world is retarded.