Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

As a person in the Network Security business--- we can get you.

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » General Discussion Donate to DU
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:42 AM
Original message
As a person in the Network Security business--- we can get you.
I'm going to tell you right now....nothing, and I mean nothing is safe on the Internets and Mobile Networks.....

Social Networking... we can get you.

App's on your smartphones, we can get you.

Associating your device to a wireless access point.... we can get you...

Hard wired, wireless, 3g---4g... don't matter, we can get you.

The best way to get you is by simply physically stealing your shit.

You ever sit in a Starbucks and leave your laptop or IPad sitting on the table while you go take a pee? You'd be surprised at how many stories we hear of people doing exactly that. If we get your device, game over. We can root that device and get everything.

One device can compromise your companies entire network or make your personal life miserable.

All it took was a couple of knuckleheads like Mike Stark and Dan Wolfe to bring down Weiner.

My fellow DU'ers--- if you got shit you don't want others to have, think twice before using today's wonderful technology.

We can get you.
Printer Friendly | Permalink |  | Top
Dreamer Tatum Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:44 AM
Response to Original message
1. Can you force us to send dick pics in the first place?
Can you force us to lie our balls off about it?
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:49 AM
Response to Reply #1
4. Hence the stupidity of those who do it.
I am sincerely perplexed about supposed smart people not understanding this.
Printer Friendly | Permalink |  | Top
 
malaise Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:39 AM
Response to Reply #4
30. Ding ding we have a winner
How do they not know that there is no privacy on the internet.
Printer Friendly | Permalink |  | Top
 
lpbk2713 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:48 AM
Response to Original message
2. I concur.



If anyone is determined enough and has the right resources available they are only limited by their own imagination.
I've had my own suspicions regarding some GOP election victories but I'll save comment on that for another time.


Printer Friendly | Permalink |  | Top
 
Hangingon Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:48 AM
Response to Original message
3. I think Weiner brought down Weiner.
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:51 AM
Response to Reply #3
5. Again
You will be brought down if you post shit like Weiner did on the nets. It's only a matter of time, especially if you have people out there wanting to bring you down.

In Weiners case, this wasn't a notorious hacking group.....this was just a few goobers who followed him.
Printer Friendly | Permalink |  | Top
 
Zywiec Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:54 AM
Response to Original message
6. Weiner was in the Network Security Business?
Funny, I thought the pictures of his dick, shirtless pics and chatting with college girls got him in trouble.

Who knew it also required other knuckleheads?

:shrug:

Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:00 AM
Response to Reply #6
8. Of course that's the reason...
but where did those pictures reside?

Printer Friendly | Permalink |  | Top
 
Zywiec Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:03 AM
Response to Reply #8
11. They were on his computer until he decided to send them to others
Nothing I've seen shows that others were involved.
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:35 AM
Response to Reply #11
16. There are always others involved...
in this case... Wolfe and Stack who watched Weiner like a Hawk.

These two are the guys who blew it all up.

I think you're missing my bigger point.. of course it was Weiner who put it out there...but as soon as he did... he was nabbed.

Read this:

http://www.nytimes.com/2011/06/08/nyregion/conservative-group-scanned-weiners-posts-warned-women.html?_r=1&hp

Printer Friendly | Permalink |  | Top
 
HipChick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 09:56 AM
Response to Original message
7. I've been in IT a long time...

stupid enough to leave an electronic footprint? then yeah...

As an old guy once told me, never put down anything in print that can be used against you...just apply that to the technology that's new to some folks..
Printer Friendly | Permalink |  | Top
 
Peacetrain Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:01 AM
Response to Original message
9. K&R It never ceases to amaze me that people get on a computer
and think they are having a private moment.. duh.. the whole world is watching in a sense. That is my feeling.

Printer Friendly | Permalink |  | Top
 
Romulox Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:02 AM
Response to Original message
10. So...to sum up: DON'T leave my ipad loaded w/ crotch shots unattended while I pee at Starbucks?
:shrug:
Printer Friendly | Permalink |  | Top
 
no limit Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:08 AM
Response to Original message
12. Well....yes and no.
In the example of someone stealing your laptop. If the laptop's data is encrypted you won't be able to get it. Too bad encryption is still too complicated for most people to do.
Printer Friendly | Permalink |  | Top
 
Lint Head Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:11 AM
Response to Original message
13. I worked for a major corporation with extreme network and internet security in place.
Being a feral techno geek since the inception of color television there have been many attempts to savage my privacy both technically and in person. None have been successful and some have resulted in the actual reverse. They reach out and touch me and eventually realize I have a hook embedded within tasty and enticing bait.

Printer Friendly | Permalink |  | Top
 
nebenaube Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:44 AM
Response to Reply #13
18. I''m with you, hell, I can't even turn SSH on... n/t
Printer Friendly | Permalink |  | Top
 
Lifelong Protester Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:12 AM
Response to Original message
14. Had an interesting conversation with a student of mine, and was
myself talking about how I was glad I didn't have an iPhone, don't use 'apps' to get 'free' stuff (I know it's all just data mining) and I especially was glad I wasn't being tracked.

The student did not care if s/he was being tracked! Couldn't see what the big deal was!!

I know I am in a generational divide situation. I use just enough technology (like my laptop here) to get by, I have an old, crappy Nokia phone that only is used in an emergency, and I'M WORRIED. Most young folks aren't worried yet.

And a note for those who don't know the Dan Wolfe story, there is an article on the front page of the NYT about him, whoever he is, and even though I think the whole idea of putting shots of your crotch on any electronic device is stupid, there seems to be an element of this that stinks of 'entrapment', in my opinion.
Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Jun-08-11 10:32 AM
Response to Original message
15. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:38 AM
Response to Reply #15
17. Of course you can get us....
but if you think the advice is only for Grandma then you're a fucking fool.

My company is a multi-million dollar company--- why---because of Grandmothers???... I think not.

Not everyone is blessed with your brilliance.
Printer Friendly | Permalink |  | Top
 
Rabblevox Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:48 AM
Response to Reply #17
19. "My company is a multi-million dollar company"...wow, worry about penis size much?...
Multi-million means there are 10 employees and one round of VC funding, or 20 employees and 2 locations. Please get over your bad self.
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:06 AM
Response to Reply #19
23. Actually around 500 employees
Edited on Wed Jun-08-11 11:08 AM by trumad
30 offices nationwide...a couple overseas.

we're sitting around 600 million right now but expected to be a billion in 2 years.

Now why is that...Grandmothers?

Dude---I run into know it all's like you everyday... the kind that er pisses in the face of Network Security.

You guys are a dime a dozen but when you're pushed on what you know, you don't know jack shit.



Printer Friendly | Permalink |  | Top
 
Name removed Donating Member (0 posts) Send PM | Profile | Ignore Wed Jun-08-11 11:29 AM
Response to Reply #23
28. Deleted message
Message removed by moderator. Click here to review the message board rules.
 
jeff47 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:09 PM
Response to Reply #28
32. So company size is relevant?
Ok....mine is Fortune-100. IPv6, TOR, encryption, doesn't really matter. In order to be useful, the data has to be converted to cleartext somewhere. So steal it from there.

And pass-phrases don't solve the fundamental problem, which is single-factor authentication. Making your password ridiculously long or random only helps against brute-force attacks that are easily detected. Properly-done two-factor authentication solves the problem. But that has it's own potential pitfalls as the recent compromise of RSA devices shows.
Printer Friendly | Permalink |  | Top
 
ScreamingMeemie Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:32 AM
Response to Reply #15
29. "Retarded"?
Nice. And, fwiw, I think you are full of it on your "story". :hi:
Printer Friendly | Permalink |  | Top
 
Brickbat Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:18 PM
Response to Reply #15
36. I object to your use of "retarded" in this context.
It's also a rules violation.
Printer Friendly | Permalink |  | Top
 
Uncle Joe Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:45 PM
Response to Reply #15
37. Or anyone so arrogant as to believe they know it all regardless of age or mental capacity.
Personally I believe the OP gave good advice to a general audience and this is the General Discussion Forum, had you been so inclined you could have constructively supplemented his advice with some civil and sound advice of your own, thereby increasing the value of the thread, but no doubt you have your own internal challenges to overcome, good luck with that.
Printer Friendly | Permalink |  | Top
 
barbtries Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:54 AM
Response to Original message
20. since i've been on the internet
i've kept that for the most part in mind. but i'm an open book anyway, and not running for office. i am not afraid.
Printer Friendly | Permalink |  | Top
 
nadinbrzezinski Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:55 AM
Response to Original message
21. I know, I assume zero privacy in my devices
Printer Friendly | Permalink |  | Top
 
closeupready Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 10:59 AM
Response to Original message
22. Yes, the days when people could fool around on the side and nobody would know, they're gone.
nt
Printer Friendly | Permalink |  | Top
 
pansypoo53219 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:11 AM
Response to Original message
24. land line and a desk top.
ahh. the luddite way! not that i have any risky photos....
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:12 AM
Response to Original message
25. Well said. nt
Printer Friendly | Permalink |  | Top
 
LoZoccolo Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:15 AM
Response to Original message
26. If nothing can be secured, how do you convice people that you can do it for them? n/t
Printer Friendly | Permalink |  | Top
 
jeff47 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:17 PM
Response to Reply #26
35. Depends on how ethical you are.
Unethical: We can completely protect your data. Give us money.

Ethical: We can make it really, really, really hard for someone to get your data, but we can't protect you from everything. Now that the unethical guy utterly failed, give us money.
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 04:07 PM
Response to Reply #26
39. Great question---
honestly it's a thumb in the dike situation.

There are so many bad guy's out there or even hobbyists hackers and it's getting tougher every day.

No doubt---it is a battle.
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:17 AM
Response to Original message
27. Starke and Wolfe didn't "get" Weiner.
Weiner tweeted the picture himself.
Printer Friendly | Permalink |  | Top
 
snooper2 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 11:42 AM
Response to Original message
31. Um, not totally true but that's fine...
Of course the Intertubes are not secure., but you are aware of mobile encryption right?

And you mentioned "hard-wired", which I assume you are talking about terrestrial based circuits. So you don't think companies running an MPLS VPN are secure? How about a remote user connecting to the corporate VPN from a home Internet connection using a Cisco ASA?

Familiar with TLS at all?

Printer Friendly | Permalink |  | Top
 
jeff47 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:14 PM
Response to Reply #31
34. To be useful, data has to be unencrypted somewhere
Edited on Wed Jun-08-11 12:18 PM by jeff47
If you protect the data in motion via encryption, then your attacker will just steal it when the data is unencrypted at rest.

That's not to say one shouldn't try. Making it as difficult as practical will reduce the number of people who can steal your data. But there's 7 billion people on the planet. At least one of them will have the funds, equipment and knowledge to get your data. You just have to hope they don't also have the motivation.
Printer Friendly | Permalink |  | Top
 
trumad Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 04:17 PM
Response to Reply #31
42. TSL---SSL...
Edited on Wed Jun-08-11 04:17 PM by trumad
very effective. Honestly I'm not a deep dive specialist---more on the sales side but I've seen enough.

As far as mobile encryption--- We have a Mobile Security team that does nothing but Mobile.

What they can do to a smart phone is scary crazy. We use GOOD on our IPhones and it's sufficient enough for in-house emails, etc....

It's the other Apps that are problematic.

Mobile Security---Cloud Security--- big business for the future.

This thread got hijacked a bit by some Black Hat wanna be's--- but was meant more for a community service.

Speaking of Black Hat... coming up early August... should be a good one.
Printer Friendly | Permalink |  | Top
 
Blue_Tires Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 12:14 PM
Response to Original message
33. Good luck, I'm behind seven proxies!!
:hide:
Printer Friendly | Permalink |  | Top
 
GusBob Donating Member (82 posts) Send PM | Profile | Ignore Wed Jun-08-11 12:58 PM
Response to Original message
38. Last name begins with F and contains an even # of letters
never discount psychic abilities
Printer Friendly | Permalink |  | Top
 
HipChick Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 04:10 PM
Response to Original message
40. Why did Weiner not use a fake ID?
I don't get that..
Printer Friendly | Permalink |  | Top
 
tblue37 Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-09-11 12:09 AM
Response to Reply #40
43. Because the way he was trolling for women online was by
chatting up those who initially contacted him because they admired his politics. If he had not been Rep. Anthony Weiner, those women would not have contacted him in the first place.

He didn't want anonymous sex chat with anonymous women. He wanted sex chat with women who were being all impressed by his political power and celebrity.
Printer Friendly | Permalink |  | Top
 
steve2470 Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Jun-08-11 04:15 PM
Response to Original message
41. Layers of security is what you have to focus on....
Edited on Wed Jun-08-11 04:16 PM by steve2470
I'm not a network security person, but in all my reading, they repeat the layers concept constantly.
Printer Friendly | Permalink |  | Top
 
RandomThoughts Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Jun-09-11 12:54 AM
Response to Original message
44. Is that meant to be informative.
Or threatning.

Why aren't you saying that on the news?

heh

But they can't figure out I am due beer and travel money. That is laughable. :rofl:
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri May 03rd 2024, 11:57 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » General Discussion Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC