The third largest breach ever just happened in Finland. Passwords were stored in plaintext. At T-Mobile Austria, they explain that of course they store the password in plaintext, but they have so good security so it's nothing to worry about. At what point does this become criminally negligent?
(Score: 1, Interesting) by Anonymous Coward on Sunday April 08 2018, @05:20PM (2 children)
here in a top 5 canadian U, they are AES encrypted for interoperablity but the password to the master key in plain text, however you need to have the code to uncypher them cause we do proper keys derivation. the master key is never directly use to encrypt or decrypt, to do so you need a cipher key derived by hashing the master key concatenated to it's usage context. You cannot get around the fact that somewhere you have to have a key or a password stored in plaintext somewhere unless your willing to pay an operator who know the password/key to be present if a service needing cyphers is restarted
(Score: 0) by Anonymous Coward on Sunday April 08 2018, @07:12PM
I feel a public key crypto solution could be created without having the users password needing to be stored, and the legacy app getting a completely random password based on its requirements.
(Score: 2) by Joe Desertrat on Monday April 09 2018, @09:59AM
Don't worry, that is on the sticky note on the monitor.