Main » 2011 » Март » 16 » I see through you and you thus naive to believe that you are in complete safety
12:34
I see through you and you thus naive to believe that you are in complete safety
Kevin Mitnick in one of his interview with reporters, said that the weakest link in security - it's people. It is through social engineering skills, he managed to become one of the most famous hackers of today. If you think that Kevin, as shown in films about hackers sitting in a dark room with a bunch of monitors Tsiferki and cracked everyone and everything from there, never leaving this room does not, then you are deeply mistaken.

Okay. Ask yourself the question - what is the Internet knows about you? Most likely, the internet of you already knows everything, but that being said, seen can not be unseen in a global network. Now the second question - how this can be exploited.

I'm not going to invent stories for superhakerskie stupid American boevichkov where megaterroristy erase all electronic life, substitute identity in the databases of the police are looking for dandruff in the hair from satellites and so on. I have no doubt that this is all possible today, but not all of us. And that is accessible to all?

Do you have a blog? Twitter? Page created in vkontakte or facebook? You are an active user forums? Then we go to you ...

I read your same text and I was scared. Seriously.

Immediately, as they say in the forehead. Some time ago in a network of bloggers copied each other's articles, as some guy using only publicly available sources of data ultimately received toli access to credit card of his girlfriend toli Bank account. Who are not lazy, post a link.

The moral is the same - on the internet about you already so much of public information, which is enough to access your private data and private data from your friends.

With.



Popular in recent years, social networks perform different task - to collect friends irl (in real life), connect people by interests, create a community. I like that I can see how and where to live, my classmate, whom I had not seen for 10 years, I am pleased to communicate with people with the same interests as me at some site dedicated community. I also want the people to know how I'm living here, what my car where I was resting in the summer. I point out the maximum amount of information about yourself in your profile in the hope that once I find a forgotten friend and I have become a virtual friend anymore.

I have a twitter, I write there from time to time some thought, mood and observing the world around them.

I also have several blogs. Blog - this blog seems to be initially on a plan. You know, before such tetradochki were, who wrote "Today, we Vasya sculpted snowman" and then "I hate our the teacher of Russian language, so now we have blogs that seem to play the same role, but accessible to all . And people want to have more readers and that he also responded, saying, "Yes, the teacher fool!".

People write on the forums. The same lytdybr or questions / answers for some vital issues.

People have private correspondence is kept at gmail.com forever.

To.



An attacker would now gather enough information about you there is no difficulty. Sufficiently little Googling, and he will know everything about you: where and when you were born, complete data on your parents' names of all your pets, any schedule of where and when you rest, how to change your mood for the last year, what music you listen to with whom to be friends and what you eat. And that's just from public sources. He did not have yet even to invent something and even more to break the law.

Perhaps you just are not wanted.

Why.



You may or may not be the goal of the attacker, but remember what I wrote at the beginning of a weak link. Through you can safely get into a company where you work or to the people with whom you are friends.

I'm sure pulling for one publicly accessible rope, she will pull a roll of the information that you would rather hide.

As.



Do people have a circle of trust. I trust completely a small part of their friends and relatives. I trust many friends. I do not trust unfamiliar people. And the more unfamiliar.

But if a person knows everything about me, he strongly simply enter me in the circle of trust and get the right information. Enough only for casual conversation to show that we have coincided interests (of course, I'm all for wrote on vkontakte), and then somehow translate the questions to him at the right track, but I do not even notice.

Damn it, he can pretend to be my friend Vasya, which is included in the first round. Nirazu from friends on ICQ does not come to borrow money issues? But spam in vkontakte from friends?

O RLY?

Kartinochka, that was fun.

And now, more real world examples. Abstract enough horror stories.

All of you are aware that not so long ago dragged Tuyev Khuchua logins and passwords vkontakte. How did it not important for now. It is important that posted the whole thing on the Internet. Personally, Paul Durov without thinking twice (apparently) dumped an entire worksheet passwords hacked users. And now the question - how many percent of users list password to the post office (which is the login) coincided with a password to vkontakte? How many of them had a box on gmail? How many of them have ever removed the letter from him? How many services allow you to recover your password with access to the mailbox?

All, all e-man's life in your hands. Pulled by strings.

Who among you in the form of the password somewhere else posed the question "moniker pet? Think of your vkontakte and blogs I can not find an answer to this question? The real story.

Once a popular service private bookmarks into your account password, I found Rutaceae sftp login to the main server of a large company. Inside, it was interesting.

Well, again, admit it, you have only 1-2 passwords for all services? Are you sure about the reliability of each?

Need more examples? Their R O F I G A.

This I have never mentioned the leaky software and a bunch of vulnerabilities. Holes, yet not everyone can use, and publicly available information is quite arbitrary.

What to do.



Pray if you believe in God. If you are a resident of active network, it is difficult to do something. All of your pages in the cache of search engines, aggregators, and "time machine". Think of each service that you use, find a reliable program for generating and storing passwords, make a unique password for each service. Remove unnecessary correspondence. Close public access to your vkontakte.

And remember, if you're paranoid does not mean that for you no one was watching.

P.S. each item is strongly reduced, or turned out so much the long and tedious.
P.P.S. here are well written.

This should say and remind constantly as on cigarette packs about the dangers of smoking. When you register on the same forums and social networks need big red letters to write, that everything you write here may be used against you.

The fact that most of you reading this post, it's IT experts, and they (we) are familiar with the entire kitchen inside, and hence the outrage - say, yah nafig as well, I do not believe it can not be bullshit, garbage , davayka Babe me something nagugli. In this case, we have 10 passwords to various degrees sekyurnosti, a minimum of 3 soaps (registration govnoservisah, routine business and private mail which knows no more than 20 people). For us, it's all right things, the most for granted, and hence the outrage.

But this is for us, and that for girls 17 years old, who suddenly decided to fool around in the "private" correspondence with her boyfriend in some sotsseti decides to put fotochki with their sisechkami? Tomorrow, well, or the day after tomorrow, these sisechki will be on the chips.


Tell me, do you consider yourself a weak link? And I do not. I'm going to look closely to the secretary Masha and her vkontaktiku. Why do I need you with your geek and paranoia.
Views: 629 | Added by: w1zard | Rating: 0.0/0
Total comments: 0
Имя *:
Email *:
Код *: