• fl42v@lemmy.ml
    link
    fedilink
    arrow-up
    26
    arrow-down
    1
    ·
    18 hours ago

    instead of in an encrypted format on its internal systems.

    Riiight, like that’s any better. Jokes aside, it’s hard to imagine what kind of “mistake” results in storing plain text instead of hashing, unless the mistake was in choosing whoever made the security assessment

    • masterspace@lemmy.ca
      link
      fedilink
      English
      arrow-up
      16
      ·
      18 hours ago

      There was a previous article on this with more explanation that I’m struggling to find.

      The gist was that they do hash all passwords stored, the problem was that there was a mistake made with the internal tool they use to do that hashing which led to the passwords inadvertently going into some log system.

      • BearOfaTime@lemm.ee
        link
        fedilink
        arrow-up
        3
        arrow-down
        4
        ·
        16 hours ago

        “mistake”

        I call BS. The reviews I’ve gone through for trivial stuff would’ve exposed this.

        This was intentional.

        • masterspace@lemmy.ca
          link
          fedilink
          English
          arrow-up
          4
          ·
          8 hours ago

          Yeah, cause trivial systems are a lot easier to parse and review. At a base level that’s nonsense logic.

        • HiddenLayer555@lemmy.ml
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          2
          ·
          16 hours ago

          Hanlon’s Razor revised: Never attribute to malice what can be attributed to incompetence, except where there is an established pattern of malice.