• Hegar
      link
      fedilink
      11
      edit-2
      5 months ago

      Credential stuffing is a well understood part of the threat landscape that 23 and me negligently failed to account for, allowing hackers to access 7 million people’s info after hacking only 14 thousand users.

        • @BreakDecks@lemmy.ml
          link
          fedilink
          English
          85 months ago

          No, they opted to share varying degrees of information with authorized users and close genetic matches, and 23andMe failed to protect them from a large scale takeover of accounts that made public the kind of information the company had promised to keep private to semi-private.

          14,000 accounts compromise by the same entity. That’s absolutely the fault of the platform, not the users.

          • @jimbo@lemmy.world
            link
            fedilink
            -1
            edit-2
            5 months ago

            You’re making a distinction without a difference. Nobody has any fucking clue who their “genetic match” will be nor does anyone have any fucking clue who else is using 23andMe. Sharing that information with other 23andMe users is not meaningfully different than just sharing it with the world at large.

        • Hegar
          link
          fedilink
          75 months ago

          It’s not the responsibility of your grandma who’s researching family history to be aware of potential data security threats. It’s the responsibility of the multimillion dollar online company with massive, valuable data troves to not offer a feature that was just a data breach waiting to happen.

          • @afraid_of_zombies@lemmy.world
            link
            fedilink
            3
            edit-2
            5 months ago

            I remember when the housing market crashed and hearing all these rich folks talk about how it is poor people who are responsible for not knowing they couldnt afford their homes.

            Yeah so why exactly do we have a credit rating system if it isn’t rating credit?

            You are completely correct. It is not on regular people to be experts on cyber security and somehow know that the company is doing their job and will do their job forever.

    • tiredofsametab
      link
      fedilink
      95 months ago

      There are still all kinds of things a company can do to mitigate at least some of this. New browser, new location, forced two-factor auth, etc.

      • @wreckedcarzz@lemmy.world
        link
        fedilink
        English
        -65 months ago

        Cmon, we know their target market was dumbasses. How many dumbasses do you know that use mfa, or that actually look at a login notification before hitting “yes, it’s me”?