The FBI sleeps when libraries burn

    • huginn@feddit.it
      link
      fedilink
      English
      arrow-up
      69
      arrow-down
      27
      ·
      2 months ago

      This guy is outing the archive for terrible security posture by bringing attention to it because they received disclosures and did not fix them.

      Don’t get shit twisted - he’s the hero here. IA fucked up and has been vulnerable to manipulation by any number of corporate or national actors this entire time.

      • ComradeSharkfucker@lemmy.ml
        link
        fedilink
        English
        arrow-up
        57
        arrow-down
        2
        ·
        2 months ago

        If this was genuinely done out of love I could understand but due to the legal battles the internet archive is currently being dragged through, I harbor suspicion of their intent.

      • Zagorath@aussie.zone
        link
        fedilink
        English
        arrow-up
        47
        arrow-down
        4
        ·
        2 months ago

        If they were really “the hero”, they’d follow the bare minimum of responsible disclosure best practices, and allow 90 days between privately alerting them of the issue and going public with it. Two weeks is absurd.

          • Zagorath@aussie.zone
            link
            fedilink
            English
            arrow-up
            7
            ·
            2 months ago

            90 days is just the standard timeframe for responsible disclosure. And normally that’s just a baseline with additional time being given if there’s genuine communication going on and signs they’re addressing the problem.

            • ITGuyLevi@programming.dev
              link
              fedilink
              English
              arrow-up
              5
              ·
              2 months ago

              90 days is standard for “you’re code is fucked when someone presses this…”; if the issue is Dave left the keys in the parking lot and someone copied them, two weeks is more than enough time for them to recieve the notice, create a ticket to rotate the keys and a ticket to trigger an investigation (gotta document anytime an org fucks up so it doesn’t happen again, right?). Maybe I’m over simplifying it though, I don’t know how their org operates.

              • Zagorath@aussie.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                2 months ago

                I agree in general, but

                Maybe I’m over simplifying it though, I don’t know how their org operates.

                This is exactly why just sticking to the 90 day standard is better. For the supposed security researcher it’s a CYA move at worst.

      • carpelbridgesyndrome
        link
        fedilink
        English
        arrow-up
        37
        arrow-down
        2
        ·
        2 months ago

        You don’t leak a passwords database publicly on the Internet in good faith.

        • huginn@feddit.it
          link
          fedilink
          English
          arrow-up
          12
          arrow-down
          1
          ·
          2 months ago

          There’s never certainty when talking about hackers…

          That’s verbatim the content of the email and the email hack does not appear to be malicious (unlike the ddos or the password breach)

          It’s more likely that this is 3 different groups than it is a single group.

    • 0x4E4F
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Because none of this was random or premeditated as in to strengthen their security.