Hacker News new | past | comments | ask | show | jobs | submit login

"After Epic Hack [...]".

Sorry, not that epic. Yes, multiple steps were required but the biggest issue in security once again was the human element.

Epic would be finding the flaws in SSL/TLS that allows you to generate a valid cert for any domain (Moxie Marlinspike) or a bug in DNS that is such cause for concern that people have to upgrade their infrastructure (Dan Kaminsky) or intercepting GSM calls (Chris Paget) while making the device believe it is on a legitimate network.

This hack came down to social engineering and using flaws in two companies verification systems. That isn't epic. People have been calling companies and people on the phone for decades and having them hand over information without proper identification/verification. The guys stuff got remote erased, well damn, the system worked as it was supposed to work ... other than that the right person wasn't at the controls ... remote wipe worked as expected.

Yes, changes have to be made, and yes security and verification of identity has to be made more secure when there is a lot at stake, but this hack was by no means epic.




I think the description of it as epic refers to the amount and nature of the damage done, not the technical accomplishment. We expect that someone might be able to hack our online accounts, but that they could hack our online accounts and then use that to reach into our homes to nuke data off of our hard drives is different.


Remember that you have to explicitly enable this feature.

Remote wipe is NOT enabled by default.


It's too bad the feature is named 'Find My Mac' instead of 'Remote Wipe'.


Perhaps Apple need to reword their warning message[1] to scare people away from enabling it. The only indication that user is going to enable Remote Wipe is a little "erase a lost Mac" text, which I guess most people will just ignore it.

[1]: http://cl.ly/image/3u1D3F1W0m0B


I really do think these things should be separate, with separate enabled/disabled settings.

Especially on the iPhone/iPad where a lost device (i.e. behind the couch or something) is far more common than a stolen one.


I don't know. I travel a lot per train and losing my iPhone there or at a random bar/party I certainly want to remote wipe it.


But if you have enabled a 4-digit pin, why worry?


Remote wipe is a feature or Find My Mac.


I know. Remote Wipe is part of Find My Mac.

And it's not enabled by default.


You know. Many others don't, and some of those that do just want the finding without the wiping.


> This hack came down to social engineering and using flaws in two companies verification systems. That isn't epic.

Epic status is irrelevant. It was effective. It should not be. Full stop.


I think the title "Epic Hack" is justified. Not epic in terms of the skills and technologies used to pull it off but epic in terms of the impact on the hackee. Whether you gain access to someone's apartment by rappelling from the roof, disabling the electronic alarm system, and picking the lock on the balcony door or merely by using social engineering on the building supervisor the result is the same.

I think that denigrating the significance of these "low sophistication" attacks is fundamentally the same error as venerating the importance of single-points of technological complexity independent of the end-to-end security of a system. It makes it easier to change the response from "oh crap, we got hacked so hard!" to "well, we just got socially engineered, ANYBODY can do that, no big deal". Social engineering is going to remain firmly in the "epic hack" category for the foreseeable future, even in a future age of quantum computers, synthetic consciousness, and ubiquitous use of one-time-pad encryption.


Agreed. When Katrina came ashore, it was technically down to a category 2. Should I be less concerned? No, more.


Agreed, epic is a definite overstatement.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: