1045
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 13 Sep 2023
1045 points (95.9% liked)
Technology
59414 readers
1156 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
It's effectively a case of "I left my house unlocked and unarmed while I went on vacation. No one broke in, so I don't see the point in door locks and alarm systems."
Twitter got very VERY lucky that the worst that happened was some outages.
They moved hyper sensitive user data in a moving truck. If anything had gone wrong they would've exposed millions of peoples sensitive data.
You are supposed to wipe the servers before you move them, you shouldn't be driving servers around on the highway while they are still chock full of peoples credit card info and shit.
What sensitive data does Twitter hold? Genuinely curious
We don't know what was on those servers, but it was apparently sensitive enough that the government redacted descriptions of the data in court filings.
https://arstechnica.com/tech-policy/2023/09/us-government-slams-musk-in-court-filing-describing-chaotic-environment-at-x/
Isn’t all of it encrypted though? Like I understand physical access to servers is generally bad, but you’d think once the the things are unplugged it would be difficult to access the data again without bypassing encryption. I’m not a software engineer though
I'm a security engineer, and encryption is great, but can be bypassed. Relying on encryption assumes it was implemented properly, that the system was shut down properly so all keys were flushed correctly, and the encryption algorithm doesn't have weaknesses.
Generally if somebody dedicated enough can acquire physical access to a system, they can probably find a way into it given the right resources. Did that happen here? Probably not. Could it have? Absolutely. That's why most enterprises or government hard drives are shredded rather than just relying on them being wiped or encrypted.
Encryption is part of the solution, but it's not automatically the complete solution.
Probably because the government is still illegally spying on citizens and they don't want the specifics to leak out.
You don't consider credit card info sensitive? May I have yours?
BS, I don't know if Twitter holds credit card data, but if they did, they would have needed to abide by PCI DSS rules, which requires encrypting the data in special hardware security modules.
So no, moving those servers wouldn't put the data at risk.
Tell me you don't understand how PCI works without saying you don't understand how PCI works.
Those systems can very much store PCI data and it's very much possible that those were the systems that contain information as most of the times it's on general servers.
Personally identifiable information (PII) is any set of data that has a chance to uniquely identify a person, including name, address, credit card info, social security, etc. It can also include things like birthdate, city, IP address, and so on, depending on how the combination of data works. The general rule of thumb is that you want to aggregate out to the city level at least, or completely anonymize the data. These, I’m supposing, we’re raw records that contained account info.
Isn’t all of it encrypted though? Like I understand physical access to servers is generally bad, but you’d think once the the things are unplugged it would be difficult to access the data again without bypassing encryption. I’m not a software engineer though