Welcome to DU! The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards. Join the community: Create a free account Support DU (and get rid of ads!): Become a Star Member Latest Breaking News Editorials & Other Articles General Discussion The DU Lounge All Forums Issue Forums Culture Forums Alliance Forums Region Forums Support Forums Help & Search

General Discussion

Showing Original Post only (View all)
 

Savannahmann

(3,891 posts)
Tue Sep 2, 2014, 09:01 AM Sep 2014

So how did Hackers get pictures from 101 Celebs? [View all]

Every time there is a hacking story, there are a flood of news stories about how to choose a secure password. These stories give the impression that the people who were hacked were partially to blame by choosing a simple or common password. But that impression is both erroneous, and stupid. Nearly every site gives you a handful of chances to enter your password before it starts sending out alerts. The Systems Operators would be notified if someone had their computer sending in hundreds or thousands of passwords randomly to try and gain access to dozens or hundreds of accounts.

Besides, that wouldn't explain the recent Russian hack in which billions of user-names and passwords were hacked.

So what do I think happened? I think someone hacked the "god" or master access password. Either the company master password, or one of the various back-door access routes put in place for the NSA/GCHQ/FBI/DHS to keep an eye on things. We already know how stupid the security professionals are at the NSA. And we know that one of the causes leading to the BP Oil spill in the Gulf of Mexico was that the inspectors spent their time watching porn on the internet at work. We also know that the FBI can access webcams secretly.

So I honestly believe that one of the hackers learned of the master access from either Apple, or one of the lack of intelligence agencies that have master access in the name of national security. Because when you put in a back door, you bypass all the other security. The system doesn't go hey, this computer is new, lets ask the user some questions to see if they are why they claim to be. It doesn't ask you to confirm a credit card number, or one of your security questions. The god of the system is in there, and the security protocols can't apply to god.

Or it could be that one of the hackers involved, actually works for one of the security agencies. You can't rule that out under the pretense that the people working for those agencies are all awesomely moral and dedicated individuals. Remember the cops in California who were running women on dating sites through the NCIC. They were quite open about, and until one person spoke up, nobody thought anything of it.

Besides, the Feds love to hire hackers, and there is a certain amount of logic to it. I mean, you send a con man to find a con man. A liar will always spot another liar. So the idea of using a hacker, to find other hackers, makes a certain amount of sense. However, what must be remembered is that these former criminals require a great deal of scrutiny and supervision to insure that they are not returning to their old ways.

I honestly believe that the hacking attacks we are hearing about are because of these back door access abilities. The company has them so they can get in to see if there is kiddie porn or other requirements that the Government put upon them. The Government agencies have the access to find terrorists and other criminals. The more agencies that get involved trying to find one small subset of criminal, the more back doors there are, with limited or non-existent security. While you may have one password to your iCloud account, there are probably a dozen or more passwords that will get someone else access.

Yes, the hackers are criminals for stealing the pictures. But I wonder if we'll ever find out how many people viewed those pictures who got a Government Paycheck before this story broke?
9 replies = new reply since forum marked as read
Highlight: NoneDon't highlight anything 5 newestHighlight 5 most recent replies
Latest Discussions»General Discussion»So how did Hackers get pi...