• Logical@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 days ago

    On the one hand, sucks that a leak like this even happens anymore, no one deserves to be doxxed like that. On the other hand, I struggle to feel bad for the users of the doxxing app getting doxxed in return…

  • guyoverthere123@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 days ago

    Don’t want your information on the internet? don’t upload it to anyone on or over the internet, it really is a fucking simple concept.

    • DreamlandLividity@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      edit-2
      3 days ago

      Posted on an article about app encouraging different users to upload info about you without your consent. Yes, really simple.

    • fafferlicious@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      don’t upload it to the internet!

      or use a smart phone

      or corporate searches that track you

      or go to any website with ads - they track you

      hell don’t even search the internet! your ISP tracks dns requests

      or use a modern tv that tracks what is on your screen

      or you can do custom phone from - just unlock the bootloader, root it, and install! then just setup pihole/adguard/self-host everything

      it’s simple, for privacy just go live in a yurt in the woods to not be tracked 24/7

    • rottingleaf@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Fucking simple concept which major businesses are economically compelled to gaslight you out of.

      So the problem is in economics.

      Each such business provides all of their infrastructure, expensive, good and well-maintained (Google has its own Internet cables), which is not separated from their application services.

      So one provider of infrastructure (in the wide sense, solving all the problems) usually serves many users of their own application and many application providers (I’m inventing terms) without their own infrastructure.

      While user of an application generally can’t switch infrastructure providers as they want. It’s kinda technically fine and normal (there are NTP server pools, one could in the olden days search many FTP servers for the needed file, and so on), but doesn’t happen IRL. Because there’s no standard way for pooling resources and tracking them, and there’s no applications using it.

      So - the data model (cryptographic global person identities, globally identified by some derived hash posts (a post is, say, datetime, author, some tags, content, hash of it all, signatures, I dunno) (creation of a group or a vote or a changing of privileges or moderation can be a post too), for forming a representation for the user a group is “replayed” in the right order to know which user had a privilege to, say, moderate posts etc ; one can also generate group snapshots from time to time when replaying thus, by the group owner identity, to make it faster) is orthogonal to the service model. That’s important so that it were fit for alternative service models, like sneakernet or offline-enabled mesh or anything delay-tolerant. Or at least a p2p kademlia DHT-based service model.

      The service model - the core of it all is a tracker service. It works like a tracker in BitTorrent (or maybe Hotline, but that’s old), except with signed announces, and it tracks search and storage and relay and maybe even computation services (which announce themselves to it). A search service gets storage services from trackers and indexes their contents (one can even announce objects to a search service similarly to trackers, might be better) to search by tags. A storage service just stores objects and yields them. A relay service must be harder, you the user must somehow announce (to trackers too?) which relay service you are registered on at this moment, a bit like SIP or like SMTP (only very temporary), so that messages to that relay service would reach you.

      The client would just request a bunch of trackers for all things they need - to search for stuff for services, then request these services and merge their results. Forming a group representation is “searching for stuff” too, and then getting the objects referenced by index service responses from a bunch of storage services. To notify another user that you’ve sent them a message one can use a relay service.

      I think it’s easy to see that it’s kinda primitive other than requiring proper cryptography. And it’s a global system working over the Internet (except no, it doesn’t exist). Similar to NOSTR, but I think better due to separation of data model and service model.

      The advantages of this - one still can make any kinds of applications using such common infrastructure, but the resource-based feudalism we have this might hurt. Similar to how BitTorrent keeps working despite quite a few people not liking it.

      The disadvantages - well, stuff will get lost, there are paid BT trackers but no paid BT peers, while in such a system paid storage and other services would be a thing (still much better than Facebook).

    • queueBenSis@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      that’s my theory. how can you be so grossly negligent to expose all your data with no ACLs. especially when collecting personal identification

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 days ago

        Gross irresponsibility wouldn’t be unheard of for an unscrupulous “tech capitalist” who’s better at promoting by overpromising safety & security & rushing out half-baked minimum viable junk instead of properly implementing it.

        Still, someone malicious could as easily do the same in an atmosphere of declining tech savvy.

    • zarkanian@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Yeah, first time is an accident. Second time, though…?

      I do try not to attribute to malice anything that can be adequately explained by stupidity. At the end of the day, I don’t think it really matters. This level of stupidity is gross negligence, and they need to get sued through the floor.

    • Phoenixz@lemmy.ca
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      No, the direct opposite

      Doesn’t matter what side you’re on, when you’re extremist, you’re extremist

  • blitzen@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 days ago

    Everyone is talking about the poor security practices, which is fair. Or they are talking about the appropriateness of such an app existing, which is also fair.

    But the immediate take away should be, especially in today’s political environment, that we cannot and should not trust sensitive data that leaves our device, particularly if you are of any kind of non privileged group.

      • blitzen@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 days ago

        You’re not adding much to the “this app is appropriate” argument.

        • outhouseperilous@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 days ago

          Well the point of the app was to identify the small percentage of men who do most raoe Nd stuff, and even if the law wouldnt stop them, help potential victims avoid them, so as to not have to be guarded around every man one meets like hes a potential vicious rape monster, because some just are.

          Im saying all men are garbage, and the fundamental oremise that you can under any conditions act like any number of men are human is foolish and likely to get you hurt. Which i think this situation show.

          • blitzen@lemmy.ca
            link
            fedilink
            English
            arrow-up
            0
            ·
            3 days ago

            I don’t think anyone questions the “point” of the app. But the devil, as they say, is in the details.

              • ArcaneSlime@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                0
                ·
                3 days ago

                No no, you can’t walk that back now, Fred Rogers is trash too. You can’t even have one.

                What gender do you identify as btw? Because from now on I’m going to assume all of that gender is just as garbage as your dumb ass.

    • DreamlandLividity@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      This has been the case for a long time, so suddenly you have apps like Tea that encourage you to upload info of other people. So now even the few that take care not to upload their info can be nicely monitored. And the Gestapo does not even need to pay their informants for it.

    • zarkanian@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      This sounds like victim-blaming. This website didn’t even secure their database with a password. Come on. I’m sure their privacy policy gave the standard promises about storing their private data in a secure way, which they did not do.

      • mic_check_one_two@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        I’m sure their privacy policy gave the standard promises about storing their private data in a secure way, which they did not do.

        Their ToS can be found here. Section G of their Limitation of Liability tries to shield them from liability against data breaches. But if they were criminally negligent, the ToS won’t protect them. The Data Protection section basically just says “check our Privacy Policy for info on what we collect”, which is pretty standard fare for a ToS.

        The Security section of their Privacy Policy is also extremely boilerplate. Here’s the entire thing:

        Security of Your Personal Information
        The security of your Personal Information is important to us. When you enter sensitive information (such as credit card number) on our Services, we encrypt that information using secure socket layer technology (SSL).Tea Dating Advice takes reasonable security measures to protect your Personal Information to prevent loss, misuse, unauthorized access, disclosure, alteration, and destruction. Please be aware, however, that despite our efforts, no security measures are impenetrable.If you use a password on the Services, you are responsible for keeping it confidential. Do not share it with any other person. If you believe your password has been misused, please notify us immediately.

        This one particular sentence may end up burning them though:

        Tea Dating Advice takes reasonable security measures to protect your Personal Information to prevent loss, misuse, unauthorized access, disclosure, alteration, and destruction.

        I think most people (and the courts) would agree that putting a password on your database is a reasonable security measure that would be expected per this Privacy Policy. Especially since their next sentence goes on to elucidate that users should keep their passwords confidential.

      • DrSteveBrule@mander.xyz
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        Encouraging people to be safe and care about their privacy on the internet is not victim blaming.

        I’m sure their privacy policy gave the standard promises about storing their private data in a secure way, which _they did not do. _

        This is what people want to warn others of. The developers of Tea are hardly the only offenders. Definitely not an example of victim blaming.

      • blitzen@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        In the current environment, at-risk people (women, immigrants, etc) who might have “at-risk” activities (abortion, immigration, etc) don’t have the luxury of relying on a privacy policy. I am not blaming them, I am simply stating how it must be if they are to avoid adverse actions.

        This particular instance involved poorly secured data; what happens when warrantless demands are made by the government?

        The Tea debacle proves that sensitive data cannot be trusted once out of your hands.

        • blargh513@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          I agree. The reality is that nobody should be trusting these platforms with such sensitive data. As demonstrated, there is so much that can go wrong when you trust these companies. This is a LOT of risk for very little reward.
          Whatever you put online you should think “what if this were made public and attributed to me” before you post it.

      • Korhaka@sopuli.xyz
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 days ago

        The UK government can shove it up their fucking arse.

        Sincerely, A UK citizen.

        • rmuk@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 days ago

          And here’s your daily reminder that the OSA was introduced, championed and passed by the Tories in 2023 despite outcry. Sunak even said at the time it was a problem for the “next Parliament” to deal with. Now they’re trying to blame Labour.

    • lmmarsano@lemmynsfw.com
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Did they use Tea app to spill tea about the shitty security practices of Tea app? Do they spill tea there about the app’s founder, Sean Cook, and frivolous claims of a safe space that preserves anonymity?

    • Echo Dot@feddit.uk
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      Even an AI wouldn’t do something this stupid.

      Every piece of information it its data set about Firebase would have told it to secure the database.

    • FauxLiving@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      This wasn’t vibe coding, it’s incompetant devops.

      You have to go out of your way to make these buckets public like this. Several giant “Everyone will have access to this” warnings, re-authentication, a permanent warning symbol on the dashboard AND regular e-mails reminding you that you have a public bucket. I don’t even think you can do this via the API, it requires a human to manually make this setting.

      I’m guessing that they couldn’t figure out how to configure the Access Control Lists and just made it public so that it would work. That’s fine in a test environment, without any user data but it’s pure incompetence to have a production system setup this way.

      • loudwhisper@infosec.pub
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        If in were in the security team of that company, I would never accept ACLs on the bucket as a sufficient compensating control for this risk. Here the best most reasonable would be encryption, which would make the bucket being public relatively unimportant.

        When you are collecting so sensitive data (potentially including personal data of people not using your service), you simply can’t even imagine doing that by storing the data unencrypted.

      • lmmarsano@lemmynsfw.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        edit-2
        4 days ago

        I don’t even think you can do this via the API

        Someone never heard of terraform & similar configuration management software? They enable configuration as code, which can be vibe coded. Practically anything online can be configured via API, especially cloud services.

        • Echo Dot@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          edit-2
          4 days ago

          I’m pretty certain you would still get the constant emails though. I don’t think there’s a way to turn those off other than to secure the bucket.

          Anyway I still maintain that an AI wouldn’t have made this mistake so the fact the mistake was made kind of implies that it wasn’t vibe coded.

        • Echo Dot@feddit.uk
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          Yeah I could see it being left like this for an hour or so while someone finds out what the actual security configurations are supposed to be, during which time it wouldn’t have any data in it. But to leave it like this for any period of time is ridiculous and to release it like this is criminal.

        • FauxLiving@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          It’s not great, but it’s an acceptable kludge if you’re the one holding everyone back and you can’t figure out the problem immediately. Set it to public, let the devs get to work and research the problem until you find a real solution.

          The test environment data should be generic so if someone were to discover the bucket they’ll get some pictures of cats and a bunch of people who live at 12345 anywhere street.

          • blargh513@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 days ago

            What? No, this is a horrible practice.

            If you can’t figure out how to set identity-based ACLs you shouldn’t be working in technology! Oh I’ll just set this shit to any/any and figure out later. FUCK ANYONE WHO DOES THIS IN THEIR LEFT EAR.

          • gravitas_deficiency@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            0
            ·
            4 days ago

            It’s a bad idea to leave your S3 perms wide open, because then anyone can use your S3 bucket for whatever reason they want, and it’ll hit your wallet. And if they can’t figure out basic IAM and ACLs, I’m also betting they can’t figure out “requester pays”

  • magnetosphere@fedia.io
    link
    fedilink
    arrow-up
    0
    ·
    4 days ago

    The Tea app is a women-only dating safety platform where members can share reviews about men, with access to the platform only granted after providing a selfie and government ID verification.

    This sounds irresistible for angry misogynists. The only thing that surprises me about this is that it didn’t happen earlier.

    • Fondots@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      4 days ago

      The only thing that surprises me about this is that it didn’t happen earlier.

      I’m way out of the dating game at this point, and also a man, so it’s very likely that I’m just out of the loop

      But I hadn’t heard anything about this app until a couple weeks ago when I saw an article or two about it

      Then about a week later this happened

      So I kind of feel like maybe most of the assholes who did this were similarly unaware of it until it got some exposure and then it was on their radar.

      I would certainly imagine that most women using this app probably weren’t telling the angry misogynists in their lives about this app.

      • Hozerkiller@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        4 days ago

        Warning I’m going off memory and I’m too lazy to check this.

        One of the articles on the first data leek mentioned it became big on the google play store shortly before the leek. It probably just wasn’t around long enough for you to notice it.

        • Captain Aggravated@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          4 days ago

          The article linked above asserts that it was a “legacy portion” of the database that got leaked, and that all the leaked data is from February 2024 and earlier. So this vulnerability apparently existed for at least 18 months. The timing of the leak coincides with a spike in popularity which brought wider attention down on it, and finally someone without the desire to implicitly trust it gave it a look.

          Which says to me that in the few years this app has existed, it was never scrutinized, not by anyone on the dev side and not by anyone on the user side. That’s fascinating to me.

  • Ganbat@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    0
    ·
    4 days ago

    They hired an investigator? Any investigator worth a shit is gonna say that they’re liable for failing to secure private data they collected, as well as for retaining data they were apparently legally obligated to delete