Ride-sharing service subpoenas GitHub for IP addresses that accessed security key.
Read the whole story
Read the whole story
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584065#p28584065:3rw7vh80 said:rakkuuna[/url]":3rw7vh80]It is so easy mess up like this though. Passwords and secrets for databases are often stored in configuration files, just like database ports and urls and other settings. Every development framework I know encourages this. And where does this configuration end up when you want to get development started fast? In the same folder as you source code. Your source code goes to version control and that's how you get in a mess like this.
Almost every developer I know (including me) has committed passwords to version control. The lucky thing is usually you are not committing into public repositories. Common development frameworks should have some best practices on how to do it properly since everyone makes the same mistake...
Though in the case of Uber, they should hide internal databases behind a firewall to prevent things like this. You should not be able to access it from public internet, no matter how many passwords you know. That is the easiest fix for dumb developers.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584357#p28584357:30a7kbx1 said:psd[/url]":30a7kbx1][url=http://meincmagazine.com/civis/viewtopic.php?p=28583993#p28583993:30a7kbx1 said:chipmunkofdoom2[/url]":30a7kbx1]It's really simple: if we want these incidents to stop, we need penalties for the companies that leak information. The HIPAA act specifies penalties ranging from $100 to $50k per violation if PHI is leaked. Damages could even be assessed per record released, depending on the size of the breach. Healthcare data breaches happen, but they're relatively rare. Consumer data breaches are a dime a dozen, from Target to Home Depot to LinkedIn. The list goes on and on.
Businesses treat securing data properly as optional because it is. If a breach occurs with consumer data, there are no penalties except for potentially losing some business. Securing data properly needs to be required by law and punitive damages need to be assigned for violations. Securing personal data needs to be a cost of doing business, not something that's nice to do.
The key though is "willful neglect" which, I don't know can be said in this case or more generally, can be established in every db hack. IANAL, of course.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584257#p28584257:2cdhwe93 said:uhuznaa[/url]":2cdhwe93]
Uber is expanding like a gas into a vacuum right now and is just as able to fill all the available vacuum in any meaningful way as the gas would be.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584391#p28584391:3b2z50ap said:darkangel666[/url]":3b2z50ap][url=http://meincmagazine.com/civis/viewtopic.php?p=28584149#p28584149:3b2z50ap said:Iphtashu Fitz[/url]":3b2z50ap][url=http://meincmagazine.com/civis/viewtopic.php?p=28584103#p28584103:3b2z50ap said:yakumo[/url]":3b2z50ap]if the key is posted in public, how is anyone using it at fault?
Mainly because the database itself is likely not publicly accessible. Whoever used this key would have had to broken into Ubers corporate network to exploit it.
The article says that database was accessed from an IP not associated with Uber, so it looks like database IP itself was also publicly available. Usually, to accuse someone in unauthorized data access this person should access data against the reasonable measures to guard the data by the owner. In this case keys were place in public access, no reasonable measures to guard data were taken. So court shouldn't grant Uber's request to disclose IPs of those who accessed the guthub project. Uber pretty much gave database keys to public for anyone to access.
I couldn't have said it better. And I think this applies to many of the "old business made with an app" startups.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584483#p28584483:1d8hgfdv said:hizonner[/url]":1d8hgfdv][url=http://meincmagazine.com/civis/viewtopic.php?p=28584257#p28584257:1d8hgfdv said:uhuznaa[/url]":1d8hgfdv]
There's no vacuum of taxi services. The only vacuum Uber is expanding into is a vacuum of irresponsible, rule-ignoring taxi services with enough money to keep politicians at bay.
A smartphone app for dispatching cars is not comparable to the discovery of fire.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584305#p28584305:3gre2boy said:Rookie_MIB[/url]":3gre2boy]I'm curious as to how much trouble the person who downloaded the dbase could get into. You have a public facing website. A publicly posted key. Person takes public posted key, enters public facing website, downloads what's there...
No security was 'hacked', encryption wasn't 'circumvented', any curious 12 year old could have been responsible for this, which would have been double the age of the person who apparently designed their security.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584387#p28584387:3j1ak9cz said:Bob.Brown[/url]":3j1ak9cz]Sadly, health care data breaches are not rare. Anthem (a major health insurer) released my SSN and other identifying data along with that of 80 million of my closest friends. Fined? Naaaaah![url=http://meincmagazine.com/civis/viewtopic.php?p=28583993#p28583993:3j1ak9cz said:chipmunkofdoom2[/url]":3j1ak9cz]It's really simple: if we want these incidents to stop, we need penalties for the companies that leak information. The HIPAA act specifies penalties ranging from $100 to $50k per violation if PHI is leaked. Damages could even be assessed per record released, depending on the size of the breach. Healthcare data breaches happen, but they're relatively rare. Consumer data breaches are a dime a dozen, from Target to Home Depot to LinkedIn. The list goes on and on.
Businesses treat securing data properly as optional because it is. If a breach occurs with consumer data, there are no penalties except for potentially losing some business. Securing data properly needs to be required by law and punitive damages need to be assigned for violations. Securing personal data needs to be a cost of doing business, not something that's nice to do.
http://www.npr.org/blogs/health/2015/02 ... s-multiply
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584391#p28584391:dj65gz7d said:darkangel666[/url]":dj65gz7d][url=http://meincmagazine.com/civis/viewtopic.php?p=28584149#p28584149:dj65gz7d said:Iphtashu Fitz[/url]":dj65gz7d][url=http://meincmagazine.com/civis/viewtopic.php?p=28584103#p28584103:dj65gz7d said:yakumo[/url]":dj65gz7d]if the key is posted in public, how is anyone using it at fault?
Mainly because the database itself is likely not publicly accessible. Whoever used this key would have had to broken into Ubers corporate network to exploit it.
The article says that database was accessed from an IP not associated with Uber, so it looks like database IP itself was also publicly available. Usually, to accuse someone in unauthorized data access this person should access data against the reasonable measures to guard the data by the owner. In this case keys were place in public access, no reasonable measures to guard data were taken. So court shouldn't grant Uber's request to disclose IPs of those who accessed the guthub project. Uber pretty much gave database keys to public for anyone to access.
You are just one developer, though. Uber is a billion dollar company. I am sure they can afford at least a team of security guys.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584881#p28584881:36r8bbor said:Hawaiijim[/url]":36r8bbor]If Uber made their database keys public knowledge, then they fully deserve the coming class-action lawsuit.
That said, as a developer I know it's way too easy to accidentally include the keys in source control.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584981#p28584981:986zxmtb said:Wall[/url]":986zxmtb]This sounds like a sabatour, not simply ignorance. Ignorance is using a sticky note on a monitor. This is the equivalent of putting it on a highway billboard.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584725#p28584725:2ezih3xa said:Findecanor[/url]":2ezih3xa]Am I the only one who finds that the biggest wrong-doing by Uber in this story is that they are requesting that Github should yield their user-access records to Uber instead of to law-enforcement?
Or is there something that I missed in this story?
The contents of these internal database files are closely guarded by Uber,"
To be fair, is anyone surprised? Paying attention to anything other than "being disruptive" is not part of their core business model.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584043#p28584043:175f3pu8 said:thegrommit[/url]":175f3pu8]Heh, not suprised. This is Uber. Not paying attention to security and privacy is part of their business model.
You hit the nail on the head. Uber is what happens when mommy's special snowflake starts a business in the 21st century.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584131#p28584131:761a9f7s said:hizonner[/url]":761a9f7s][url=http://meincmagazine.com/civis/viewtopic.php?p=28584043#p28584043:761a9f7s said:thegrommit[/url]":761a9f7s]Heh, not suprised. This is Uber. Not paying attention to security and privacy is part of their business model.
Not paying attention to security, privacy, labor conditions, longstanding laws directly targeted at their main business...
Basically Uber appears to be run by douchebags who think they're above it all, and that paying attention to WTF you're doing is for little people who aren't "disruptive". No surprise if the attitude trickles down.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28585159#p28585159:2ye20xhk said:NemesisX00[/url]":2ye20xhk]It's a sign of the times when a company can make such an egregious mistake and then think the correct action is to sue the service provider whose service was used (by said company) to cause the mistake.
It really doesn't matter what data they took, these "John Does" did nothing explicitly wrong according to the law. They clearly were given access purely based upon the fact that Uber put up the access key on a publicly accessible page. EVERYONE had access.
But how many security incidents have to happen to establish a pattern of wilfully negligent behavior? Doing this once? Hard to make a case for willful negligence. Failing to secure drivers' personal data, followed up by failing to secure customers' personal data? Now it starts to look a little more . . . I hesitate to say "sinister", but it certainly looks like Uber isn't that interested in protecting the personal data of the people they interact with. Toss on top of that the doxxing allegations and the accusations that they weren't actually doing the background checks they said they were from last year, and you're starting to paint a picture of a company that is willfully placing profit about security. . .[url=http://meincmagazine.com/civis/viewtopic.php?p=28584357#p28584357:qdzmtzpq said:psd[/url]":qdzmtzpq][url=http://meincmagazine.com/civis/viewtopic.php?p=28583993#p28583993:qdzmtzpq said:chipmunkofdoom2[/url]":qdzmtzpq]It's really simple: if we want these incidents to stop, we need penalties for the companies that leak information. The HIPAA act specifies penalties ranging from $100 to $50k per violation if PHI is leaked. Damages could even be assessed per record released, depending on the size of the breach. Healthcare data breaches happen, but they're relatively rare. Consumer data breaches are a dime a dozen, from Target to Home Depot to LinkedIn. The list goes on and on.
Businesses treat securing data properly as optional because it is. If a breach occurs with consumer data, there are no penalties except for potentially losing some business. Securing data properly needs to be required by law and punitive damages need to be assigned for violations. Securing personal data needs to be a cost of doing business, not something that's nice to do.
The key though is "willful neglect" which, I don't know can be said in this case or more generally, can be established in every db hack. IANAL, of course.
They aren't. This latest eff-up just confirms that my decision to avoid dealing with them was the right one.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584451#p28584451:cxfapnr7 said:TomXP411[/url]":cxfapnr7]Someone tell me again how this is a trusted company, and we should be backing them as they Fight The System?
[url=http://meincmagazine.com/civis/viewtopic.php?p=28585249#p28585249:xqc7jnlw said:tacothursday[/url]":xqc7jnlw]There is no certainty that the key's presence on github is how it was obtained.
This wide net casting is absurd. I hope the court does not give into this.
If uber could provide a suspected IP address to cross-reference, I would be more inclined to entertain the sharing of info... But this is outright surveillance in the same way that our government wishes to intercept and replay all its citizens communications / transactions.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584065#p28584065:e76rnuhq said:rakkuuna[/url]":e76rnuhq]Though in the case of Uber, they should hide internal databases behind a firewall to prevent things like this. You should not be able to access it from public internet, no matter how many passwords you know. That is the easiest fix for dumb developers.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28585291#p28585291:3v3ivdze said:bcassada[/url]":3v3ivdze][url=http://meincmagazine.com/civis/viewtopic.php?p=28585249#p28585249:3v3ivdze said:tacothursday[/url]":3v3ivdze]There is no certainty that the key's presence on github is how it was obtained.
This wide net casting is absurd. I hope the court does not give into this.
If uber could provide a suspected IP address to cross-reference, I would be more inclined to entertain the sharing of info... But this is outright surveillance in the same way that our government wishes to intercept and replay all its citizens communications / transactions.
It seems reasonable to me that they pursue the IP of whomever pulled that file on that day. Not sure why you think that is a wide net unless you assume (and perhaps rightly...I dunno) that they haven't already taken reasonable steps to eliminate other avenues to obtain said key.
If you're paying Git for the repo, then access to these logs is absolutely reasonable and proper from a security perspective.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28585383#p28585383:3q4ti3mr said:tacothursday[/url]":3q4ti3mr][url=http://meincmagazine.com/civis/viewtopic.php?p=28585291#p28585291:3q4ti3mr said:bcassada[/url]":3q4ti3mr][url=http://meincmagazine.com/civis/viewtopic.php?p=28585249#p28585249:3q4ti3mr said:tacothursday[/url]":3q4ti3mr]There is no certainty that the key's presence on github is how it was obtained.
This wide net casting is absurd. I hope the court does not give into this.
If uber could provide a suspected IP address to cross-reference, I would be more inclined to entertain the sharing of info... But this is outright surveillance in the same way that our government wishes to intercept and replay all its citizens communications / transactions.
It seems reasonable to me that they pursue the IP of whomever pulled that file on that day. Not sure why you think that is a wide net unless you assume (and perhaps rightly...I dunno) that they haven't already taken reasonable steps to eliminate other avenues to obtain said key.
If you're paying Git for the repo, then access to these logs is absolutely reasonable and proper from a security perspective.
If it's paid / closed to the public, that's different. I'm assuming it was in a public repo and that Uber is essentially suing for the license plate # of everyone at drove through (for over 6 months was it?) that gate.
I don't like to think to myself, "Hey, I wonder how Uber put its application together... Maybe it can help me out with my homework" is going to get my identity revealed through my ISP, etc.
Somebody at Uber noticed it had been a month since the last time the company had pissed off a bunch of people, and took bold action to rectify the issue.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584043#p28584043:3w25ynn5 said:thegrommit[/url]":3w25ynn5]Heh, not suprised. This is Uber. Not paying attention to security and privacy is part of their business model.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28584065#p28584065:31mj4mp0 said:rakkuuna[/url]":31mj4mp0]It is so easy mess up like this though. Passwords and secrets for databases are often stored in configuration files, just like database ports and urls and other settings. Every development framework I know encourages this. And where does this configuration end up when you want to get development started fast? In the same folder as you source code. Your source code goes to version control and that's how you get in a mess like this.
Almost every developer I know (including me) has committed passwords to version control. The lucky thing is usually you are not committing into public repositories. Common development frameworks should have some best practices on how to do it properly since everyone makes the same mistake...
Though in the case of Uber, they should hide internal databases behind a firewall to prevent things like this. You should not be able to access it from public internet, no matter how many passwords you know. That is the easiest fix for dumb developers.
It appears common sense is surpringly hard.[url=http://meincmagazine.com/civis/viewtopic.php?p=28583905#p28583905:1vm5636b said:theSeb[/url]":1vm5636b]Yes, we must never forget that common sense is important.[url=http://meincmagazine.com/civis/viewtopic.php?p=28583897#p28583897:1vm5636b said:MoonUnit[/url]":1vm5636b]I was going to make a comment that security is hard, but this goes way deeper than that.
Which is why you shouldn't be using external source control for internal infrastructure projects. Especially not public ones. Seriously, it just one machine running some source control software, maybe a backup, but hundreds if not thousands of developer can run on a single server. You never have the loads with developers you have with users, so why the fuck would you use external ones?[url=http://meincmagazine.com/civis/viewtopic.php?p=28584881#p28584881:1u09k8kh said:Hawaiijim[/url]":1u09k8kh]If Uber made their database keys public knowledge, then they fully deserve the coming class-action lawsuit.
That said, as a developer I know it's way too easy to accidentally include the keys in source control.
[url=http://meincmagazine.com/civis/viewtopic.php?p=28583993#p28583993:qqp9a6ov said:chipmunkofdoom2[/url]":qqp9a6ov]It's really simple: if we want these incidents to stop, we need penalties for the companies that leak information. The HIPAA act specifies penalties ranging from $100 to $50k per violation if PHI is leaked. Damages could even be assessed per record released, depending on the size of the breach....Securing personal data needs to be a cost of doing business, not something that's nice to do.
That would be me. If Uber's database really was encrypted, and it's not clear that it was, note that it didn't do any good.[url=http://meincmagazine.com/civis/viewtopic.php?p=28584589#p28584589:2u3m9a8r said:SixDegrees[/url]":2u3m9a8r]Huh. So their database was encrypted.
Where's the guy who always chimes in, when encrypting databases is brought up as a security requirement, and claims that such encryption is both impossible and useless?
What's this?![url=http://meincmagazine.com/civis/viewtopic.php?p=28584065#p28584065:90b1nnvu said:rakkuuna[/url]":90b1nnvu]It is so easy mess up like this though. Passwords and secrets for databases are often stored in configuration files, just like database ports and urls and other settings. Every development framework I know encourages this. And where does this configuration end up when you want to get development started fast? In the same folder as you source code. Your source code goes to version control and that's how you get in a mess like this.
Almost every developer I know (including me) has committed passwords to version control. The lucky thing is usually you are not committing into public repositories. Common development frameworks should have some best practices on how to do it properly since everyone makes the same mistake...
Though in the case of Uber, they should hide internal databases behind a firewall to prevent things like this. You should not be able to access it from public internet, no matter how many passwords you know. That is the easiest fix for dumb developers.