• @slurpinderpin
    link
    English
    16123 days ago

    These companies should be forced to pay big money to each and every person affected by these breaches. Not like $120. Like $10,000 per. Teach them real lessons

      • Sabata11792
        link
        fedilink
        5023 days ago

        They just pay up and do it again. It’s a business expense, not a punishment.

      • BlueÆther
        link
        fedilink
        English
        1123 days ago

        and then, us as the consumer will pay for the fine as well

    • @[email protected]
      link
      fedilink
      English
      2622 days ago

      I agree. Even at $120 each. 120 times tens of millions is serious fucking cash. We need to have a couple of big companies go bankrupt over this shit. Then maybe they will start taking it seriously. Perhaps at that point maintaining personal data on people will be seen as a liability rather than an asset. And that’s what we really need.

      • @slurpinderpin
        link
        English
        1022 days ago

        Yep data protection should be life or death. Either that or make the executives personally responsible ie the fines come out of their pockets

        • @[email protected]
          link
          fedilink
          English
          322 days ago

          Why stop there? Abolish the corporate veil. Those motherfuckers can buy liability insurance.

          • @[email protected]
            link
            fedilink
            English
            221 days ago

            Disagree. Breaking the corporate veil would have a whole lot of unintended consequences and would basically kill investment as a concept. I agree we need to do more about corporations that violate the law with impunity and get wrist slaps. I don’t think that’s it.

              • @[email protected]
                link
                fedilink
                English
                121 days ago

                Because it would greatly increase the cost and risk of investment. Think not just for billionaires, but for anybody. Imagine somebody buys a couple tens of thousands of dollars of a stock as part of their retirement, that company does something bad, and now not only do they lose their investment but they lose the rest of their retirement also.

                I am all for wiping out shareholders, especially big ones, when a company does something super stupid. There should be an incentive for shareholders to hold companies they invest in accountable.

                But suggesting that company owners become personally liable for the actions of those companies, especially when those equity owners have little or no control over the decisions of the company, that is a recipe for disaster.

                • @[email protected]
                  link
                  fedilink
                  English
                  221 days ago

                  Isn’t that the whole point of insurance? They assess the risk of that liability and average it out over time so you just pay a little bit of your return.

        • @[email protected]
          link
          fedilink
          English
          321 days ago

          Yup. We need more of the corporate death penalty. And when corporations are so big that ‘killing’ them would harm the economy, I argue we’re back to too big to fail. Maybe the answer is giant fines, and if the company can’t pay, wipe out the largest shareholders and then resell the stock over time. Make people’s personal information a giant hot potato that nobody wants to be holding.

    • @[email protected]
      link
      fedilink
      English
      2422 days ago

      Even $120 would be amazing. I just got an email that said too bad. I just bought a monitor cause that’s where they sold it. Idk why they have to save my info. I just want to pay for the product. If it was up to me, they would delete all my info immediately. They only need to record when the serial number was sold anyway.

      Oh if only I was European.

    • @[email protected]
      link
      fedilink
      English
      823 days ago

      The breach here is pretty minor, in my book. Name, address, specifics of computer purchased. The name and address is pretty much available and linked already. The computer isn’t, but doesn’t seem that abusable. Maybe it could help someone locate more-expensive, newer computers for theft, but I don’t see a whole lot of potential room for abuse.

      • @coolmojo
        link
        English
        3423 days ago

        I do see potential room for abuse. Let say someone has the list and contact the members of the list saying that they are from Dell and it is about the computer they purchased. They have all details, spec, address, etc so it believable. Then they tell them to buy some “antivirus” or install some “hot fix” etc. Scammers are already doing this, but it is less convincing.

        • BugKilla
          link
          English
          6
          edit-2
          23 days ago

          Exactly, a lot data exfil’d is used to enrich other sources. All data loss should be treated as a catastrophic failure of security controls. Corporate victims should pay for their customers potential loss of identity and privacy as a preemptive action, even if the data in of itself may be considered low risk. If compliance with this is difficult then executives should be forced under law to post all of their personal info into Wikipedia with audio samples of their voice, full genome mapping and mugshots. Fuck these companies and their profits over people attitude.

      • xep
        link
        fedilink
        1523 days ago

        Now my friends know I bought an Alienware device. I’m never going to live this down.

        • @pdxfed
          link
          English
          322 days ago

          A gamer cannot sink lower. Build your own if you care!

      • shininghero
        link
        fedilink
        823 days ago

        It’s only minor if the data points in this breach are used by themselves.
        Once you aggregate this with other data breaches, you could end up with a much bigger capability to target anyone in this breach.

      • @slurpinderpin
        link
        English
        723 days ago

        Don’t care, punish them all the same.

      • Optional
        link
        English
        523 days ago

        afaict only if a specific hardware vulnerability was found and they cross-linked it with an online account or other network info to try and exploit it.

        Or, I guess you could just assume Windows and go with one of the many zero-days that happen there. The trick is still crosslinking them tho. Presumably google has the wifi info.

    • @[email protected]
      link
      fedilink
      English
      521 days ago

      Exactly… Meanwhile some poor soul goes to jail because he is too broke to pay for some parking fines

    • @[email protected]
      link
      fedilink
      English
      5
      edit-2
      21 days ago

      Instantly makes ransomware [edit 2: my brain was being dumb, I didn’t mean literally ransomware, I meant hackers blackmailing companies with the threat of releasing/selling stolen data] far more profitable.

      Edit: And heavily discourages self-reporting. There’s a Schneier quote I like: “You can’t defend. You can’t prevent. The only thing you can do is detect and respond.”

        • @[email protected]
          link
          fedilink
          English
          221 days ago

          Absolutely. But the penalty does modify the cost-benefit analysis. If a hacker demands $5m or else they will release stolen data, you might be more inclined to YOLO the 5 mil on the 1% chance they’re an honest hacker if the penalty for the breach is $50bn.

    • @[email protected]
      link
      fedilink
      English
      422 days ago

      In the case of this breach, I’d be happy with a $10 payout, the consequences for me are actually pretty low here. That being said, I think we’d be lucky if Dell had to pay more than $0.50 per person, and that money will probably go to a lawyer’s fees, not me.

  • @[email protected]
    link
    fedilink
    English
    3622 days ago

    Got this:

    Hello, Dell Technologies takes the privacy and confidentiality of your information seriously. We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell. We believe there is not a significant risk to our customers given the type of information involved.

    What data was accessed? At this time, our investigation indicates limited types of customer information was accessed, including:

    • Name
    • Physical address
    • Dell hardware and order information, including service tag, item description, date of order and related warranty information
    • @Snapz
      link
      English
      1121 days ago

      Hello, Dell Technologies takes the privacy and confidentiality of your information seriously. We are currently investigating an incident involving a Dell portal, which contains a database with limited types of customer information related to purchases from Dell. We believe there is not a significant risk to our customers given the type of information involved. Sending you this single message satisfies our legal disclosure requirement. Beyond that, we have no actual intention of fixing this, providing you with a meaningful compensation for the breech or really doing anything different at all truthfully. Fuck you.

      • @IHawkMike
        link
        English
        1522 days ago

        Right, because international hackers are going to mobilize boots on the ground across the world to steal your fucking Optiplex.

        • @[email protected]
          link
          fedilink
          English
          4
          edit-2
          22 days ago

          I think it’s more likely that an attacker would make a fake collections call if you bought something really expensive, especially if they can prove you bought on credit or something. A little ChatGPT and you’d have a targeted script to use.

          • @[email protected]
            link
            fedilink
            English
            321 days ago

            The leak didn’t include phone numbers or emails but I’m sure there will be attempts at spear phishing businesses since they can figure out the business name from the physical address.

  • @Coldgoron
    link
    English
    3523 days ago
    Can’t have my ssn stolen if it has already hit the dark web.

    • bruhduh
      link
      English
      121 days ago

      5d chess move right here

  • @Hobbes_Dent
    link
    English
    2523 days ago

    Dude, you’re getting a delinquency letter.

    But, like, we paid our fine. Sorry 🤙

  • FenrirIII
    link
    English
    2222 days ago

    Expect a ton of Indian people calling pretending to be Dell Support.

  • @Woozythebear
    link
    English
    2123 days ago

    I’m so glad we banned tik tok so my data doesn’t fall in the wrong hands.

    • xep
      link
      fedilink
      2823 days ago

      I know you’re being flippant, but it’s worth noting that there is a considerable difference between a company getting hacked like this and an app with unfettered access to the cluster to sensors that we’ve got in our pockets.

      • @Woozythebear
        link
        English
        -2023 days ago

        Yeah, hackers having my data is so much better than China…

    • @[email protected]
      link
      fedilink
      English
      922 days ago

      The thing with tik tok isn’t only with the data China can gather from US residents. It’s also how they can use that information to influence the populace and send them propaganda, for example influencing the election results.

      • @RagingRobot
        link
        English
        322 days ago

        They can also gather information about our politicians who use it and blackmail them to get what they want

        • @[email protected]
          link
          fedilink
          English
          122 days ago

          Yep. But I guess it was already banned on government phones right? (not from the US, so I’m not all that up to date…)

          • @RagingRobot
            link
            English
            122 days ago

            Yeah but our politicians have personal phones and computers too

      • @Woozythebear
        link
        English
        -222 days ago

        Ok, what information could they gather and how would they use that to influence an election?

        • @[email protected]
          link
          fedilink
          English
          722 days ago

          The section Methods on the Cambridge Analytica wiki page explains it pretty well. While it’s not proven to be able to directly influence voting, it’s effective at swaying people’s opinions and emotions about subjects.

          • @Woozythebear
            link
            English
            -222 days ago

            So it’s all bullshit then, got it.

    • @[email protected]
      link
      fedilink
      English
      822 days ago

      The ban is a dumb policy, but you’re daft if you think the security implications are at all similar.

      TikTok was caught injecting a keylogger into their in-app browser and their response was “Well yeah, but we promise we’re not using it.”

        • @[email protected]
          link
          fedilink
          English
          522 days ago

          No. This is analogous to cross-frame scripting.

          So imagine you go to tiktok.com and you click on a link to bestbuy.com/cool-product-i-want-to-buy. But instead of taking you directly to bestbuy.com/cool-product-i-want-to-buy, it keeps you on tiktok.com and just opens an iframe with a keylogger injected into it.

          So then when you enter credit card info into the bestbuy.com UI, the tiktok.com JS can see what you typed.

          (This scenario is largely impossible these days, due to modern browser security.)

          The difference is that if you witnessed this kind of XFS in your desktop browser, you might notice it because the location bar still says tiktok.com, because you never actually left the site. But in a mobile in-app browser, you don’t need an iframe. You can inject JS directly into the browser itself, making it invisible to the user. As far as you can tell, you’re on regular ol’ bestbuy.com, not a modified version of it.

            • @[email protected]
              link
              fedilink
              English
              4
              edit-2
              21 days ago

              lmao, you asked.

              I’m not a security expert, but my tech career has involved a lot of automated testing in weird scenarios, including iframe-based Facebook games and browser-based mobile apps. Automated tests face a lot of the same challenges that a malicious third-party would, so I know a little bit about how to get past them – or rather, how to deliberately create vulnerabilities (in the dev build of your system) so that your tests can get past them.

              Edit: I am curious why someone downvoted me on that one though. I can understand how my comment about the ban being dumb but TikTok also shipping a keylogger could anger people on one side or the other. But just explaining how in-app browsers revive a security problem that’s been long-solved in standalone browsers?

  • Joanie Parker
    link
    English
    11
    edit-2
    23 days ago

    They emailed me earlier about it… Good thing I’ve only ever bought a monitor from them.

    • 🐍🩶🐢
      link
      English
      423 days ago

      Sames. They make sweet monitors.

    • @[email protected]
      link
      fedilink
      English
      222 days ago

      Even then, why do they need to store my personal information? After delivery, my info should be wiped besides the date of purchase for said serial number.

    • @WilshireOP
      link
      English
      13
      edit-2
      22 days ago

      “Dude, you’re getting your identity stolen!”

    • @[email protected]
      link
      fedilink
      English
      1221 days ago

      I got their notice email, apparently I bought a laptop charger from them years ago, and after all this time they were still keeping my name, email and physical address, which now leaked. So that’s how.