OK, a point by point refutation, as it's lunchtime, I'm having to deal with long hold times to insurers on the phone, and you appear to be posting from the moon or something.
Not holiday - working, being ill, dealing with hardware failure, impending house move, and would-be-creditors who don't understand that signing off "I certify the above information is true and correct" on a
money laundering monitoring form when they actually intend to lie constitutes an act of fraud. In all likelihood I won't get a proper holiday this year, for the second year on the trot.
But, I'm glad that you have such an optimistic view of my life. It's a nice hope that it may turn out to be true.
Anyway I don't know the people involved, and unless they wanted to talk to me direct or my grievance was strong enough that it seemed appropriate to escalate it and bother them about it - neither case came true - I wouldn't presume to do that. Part of what I was saying was, indeed, "things you already know" as I was altering my response and standpoint based on the information that yourself and others fed back about what had really happened (which, as per my original beef, we didn't get told direct; but then, as per my
immediately previous post, we arguably didn't need to be and it was blown out of proportion).
There's nothing wrong with having a list of your users, under the Data Protection Act, so long as it's kept safe and can't be stolen by hackers. In fact, for the system to operate at all, there must be SOME list SOMEWHERE in the database. Otherwise how is it going to authenticate your logon, run the private message thing, show your avatar next to your posts? How can the NHS patient records tracking system continue to run without a stored and employee-accessible list of said patients? By securing said data in ways that satisfy the DPA. Don't act as if you know unless you actually do; and if you do, get your facts straight. I've had to work with that stuff before.
Said list may not extend to having all users' email addresses in the Escapist admins' outlook addressbooks, which would be faintly ludicrous (but not outside the realms of possibility - and possible to secure so long as reasonable steps were taken), but I wouldn't think it too difficult to have a facility in, say, the board software that could send an email notification to all registered users at the email address they used to register. I've been a member of other boards where the admins have made use of this, FFS - it's the whole reason I brought it up. Again, facts: straighten them.
How are you suggesting "PMs would be infected"? Infected with what? The problem under discussion was the potential theft of user details, passwords, emails etc. And... "re-directs"? Are you high?
Of course people can't log in and read their PMs. Folk like myself may not do so very often anyway. THATS THE REASON YOU SEND OUT THE EMAILS. Plain text. A couple of lines.
Once more, Gawker did this previously when they came under attack and actually had their password database compromised. I got the email from them in my registered account, and once they were back up, logged in with the reset password they provided, changed it to something novel, and then changed it on the associated email/etc accounts.
I'm not suggesting anything unusual, non-standard, difficult, brand-new or illegal.
"Shut Down Everything" may well have been from Pandemic 2, but I didn't even know it existed (I think I vaguely remember the original Pandemic - the thing with the zombie plague, right?), let alone played it or have it at the top of my meme list. A quick google shows it was released mid-2008...
...however, the
PARAPHRASED, as in, NOT copied verbatim but echoed "in the style of" phrase was actually a mutation from an old LiveJournal (remember that?) meme, wayback in the days of Cracky-chan and the like on 4chan (must be like, what... 2006, now?), where a spooked/panicking, sulking or otherwise flouncing LJ'er would "delete fucking everything" (or, DFA), close and lock their account in response to stalking, abuse, general disagreement with their crazy opinions/terrible art, or other unwanted attention. Which fits fairly closely with the Sony reaction to Lulzsec - they frobbed the big red "emegency stop" button, and didn't untrip the breaker for quite some time.
So, I'm still going to
The_root_of_all_evil said:
- you may have done your research, but I feel at least some of it is {inadequate/misguided/incomplete/insert comedy fourth option}.
I care very little for how the Sony hack was carried out, I don't doubt it was done as you say, but I don't entirely understand what you mean (...do you?), and at this point it's irrelevant to the discussion. Yes, of course their lack of encryption is what got them in trouble - if I interpret you properly, then they didn't have their passwords going dia https or SSL or whatever, and didn't have a secondary level of security (e.g. a bank style security question answered from a randomised dropdown list that you only get to see after submitting the correct name/pass anyway), making it trivially easy to run wild through their systems once they managed to packet sniff an admin's login - but again... that's not what we're discussing. So long as the Escapist is following better basic procedures than Sony did, which we hope they do, and the attack was a DDoS anyway, it doesn't matter. The issue is one of a lack of communication of a potentially serious issue to those who may be affected by it.
I'd also like to add, as an aside, a point of extreme irony to the Sony case in that they've always previously been so goddamn careful to make sure that their users can't copy even their OWN recordings (past the first generation) by implementing various pernicious DRM schemes. Though I suppose we can see the roots of the wooly thinking that backed up their systemic "eh, one layer is enough" provisions in that you could get around the ATRAC/SPDIF no-copy bits with a fairly simple circuit that sat in-between the two devices on the digital link and just stripped said bits out of the stream (or more accurately, set them to zero on each frame that passed through). No encryption, no checksumming, just presence/no presence of the requisite bits - and similar with the Playstation copy protection, the cruddiest of which could be faked out with a piece of Lego. They make their stuff moron-proof, but skip straight to that stage without going through "idiot proof" first.