cross-posted from: https://discuss.online/post/31211123

I honest to fucking God don’t understand how cybersec is so fucking bad that there are so many damn data breaches that I lost count. I had a few accounts on chatgpt (that I dont use anymore) but they are all compromised now…

Just what the fuck is this shit? Are they done by lone actors or cybercrime gang? Or are they state actors or state-backed actors? Or are they inside jobs to allow the company to sell data illegally to make more money? Flock has admitted to using data from data breaches to their system.

You also notice how rarely you hear about cybercriminals getting caught? It’s almost like if you take even a minor bit of opsec you can get away with anything.

  • UltraMagnus0001@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 hour ago

    OpenAI claims that ChatGPT users were unaffected, with chat content, API usage, passwords, payment details, and government IDs remaining safe. However, users of OpenAI’s API interfaces at platform.openai.com have seen a variety of data exposed in this latest breach.

  • fort_burp@feddit.nl
    link
    fedilink
    English
    arrow-up
    7
    ·
    7 hours ago

    OpenAI claims that ChatGPT users were unaffected, with chat content, API usage, passwords, payment details, and government IDs remaining safe.

    Ah yes, OpenAI, the trustworthy company run by trustworthy folks. I’m sure they just need $300 bn to re-safeguard your personal data.

  • drascus@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    7
    ·
    7 hours ago

    The worst part to me is that so many companies use third parties to process parts of things that it’s like you give data to one company and they give your data to like 10 other companies and before you know it your information has been breached multiple times over from the same starting point.

  • Anarki_@lemmy.blahaj.zone
    link
    fedilink
    English
    arrow-up
    18
    ·
    edit-2
    14 hours ago

    ⢀⣠⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⣠⣤⣶⣶ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⢰⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⣀⣀⣾⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⡏⠉⠛⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣿ ⣿⣿⣿⣿⣿⣿⠀⠀⠀⠈⠛⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠛⠉⠁⠀⣿ ⣿⣿⣿⣿⣿⣿⣧⡀⠀⠀⠀⠀⠙⠿⠿⠿⠻⠿⠿⠟⠿⠛⠉⠀⠀⠀⠀⠀⣸⣿ ⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣴⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⠏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⣴⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⡟⠀⠀⢰⣹⡆⠀⠀⠀⠀⠀⠀⣭⣷⠀⠀⠀⠸⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⠃⠀⠀⠈⠉⠀⠀⠤⠄⠀⠀⠀⠉⠁⠀⠀⠀⠀⢿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⢾⣿⣷⠀⠀⠀⠀⡠⠤⢄⠀⠀⠀⠠⣿⣿⣷⠀⢸⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⡀⠉⠀⠀⠀⠀⠀⢄⠀⢀⠀⠀⠀⠀⠉⠉⠁⠀⠀⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣧⠀⠀⠀⠀⠀⠀⠀⠈⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢹⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣿⣿

    Clanker wankers will say they have nothing to hide anyway.

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    53
    ·
    19 hours ago

    “WE didn’t get hacked, we only gave all the data of our customers to a third party and THEY got hacked!”

  • NotSteve_@piefed.ca
    link
    fedilink
    English
    arrow-up
    82
    ·
    24 hours ago

    confirm[ing] that a ton of user data has been exposed owing to a breach in a third-party web analytics tool called Mixpanel.

    Important detail to know before commenting: it was Mixpanel analytics apparently that was breached and not ChatGPT itself.

    Another reason to have Firefox strict privacy mode turned on along with uBlock and Disconnect though :)

      • NotSteve_@piefed.ca
        link
        fedilink
        English
        arrow-up
        10
        ·
        16 hours ago

        For sure, yeah. When I joined my current company that provides a web service, I was blown away by how much is recorded. DataDog has a feature called RUM & Session Replay and I don’t think people realise that every mouse movement, click, and interaction in general is recorded in enough detail that as a developer I can play back user sessions as if I were watching a screen recording. Mixed with the fact that it also captures as much identifying information as it can, it’s pretty fucking creepy

    • Taldan@lemmy.world
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      1
      ·
      edit-2
      16 hours ago

      Why is that an important detail? Does itbmakeba functional difference to me as a user? OpenAI collected the data and failed to secure it. Doesn’t matter if a 3rd party was involved

      • NotSteve_@piefed.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        16 hours ago

        It’s important because none of OpenAI’s software or databases were hacked. What was hacked was a service they use. As much as I dislike it, most companies that have a presence online use analytical services

        Doesn’t matter if a 3rd party was involved

        involved isn’t the correct term for this, or rather it’s exact opposite direction. The 3rd party was hacked and as a result OpenAI data was leaked (along with any other companies using the platform that were affected)

        I bring it up because the nuance is important when I can predict people will jump on OpenAI to make claims of shoddy code. I hate OpenAI and Sam Altman but again, the nuance is important because this can happen to any company

        Get mad at the fact analytic companies collect enough data to cause this much of a mess if anything

        • zeca@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          47 minutes ago

          OpenAI gave the sensitive content to an unsecure third party. Its a risky move, so they have responsability, regardless of this being a standard behaviour.

  • straycatstrut@discuss.tchncs.de
    link
    fedilink
    English
    arrow-up
    57
    arrow-down
    1
    ·
    23 hours ago

    I was taught at an impressionable age that the only winning move was not to play. Advice that has not failed me in some 42 years now. Thanks Joshua!

  • JasonDJ@lemmy.zip
    link
    fedilink
    English
    arrow-up
    37
    arrow-down
    3
    ·
    24 hours ago

    I honest to fucking God don’t understand how cybersec is so fucking bad that there are so many damn data breaches that I lost count

    Really? It’s hard to understand?

    Dude it’s a fucking arms race between cyber security teams and attackers.

    And there’s more money in attacking than there is in defending. Defending is an expense. Attacking is almost entirely profit

    And some attackers are backed by nation-states.

    Attackers only have to get through once. Defense has to work 100% of the time.

    • ArmchairAce1944@discuss.onlineOP
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      18
      ·
      24 hours ago

      Don’t they discover them and track down who they are? If a group of jackass hackers (self taught or otherwise) are always trying to break into a system and failing a few times before getting in, wouldn’t the defenders be able to trace something about where those people are? Like is it really that dumb? Are defenders really a bunch of keystone kops driving around in circles and bumping into walls?

      • null@piefed.nullspace.lol
        link
        fedilink
        English
        arrow-up
        11
        ·
        23 hours ago

        wouldn’t the defenders be able to trace something about where those people are?

        Not necessarily or trivially.

      • CentipedeFarrier@piefed.social
        link
        fedilink
        English
        arrow-up
        10
        arrow-down
        1
        ·
        23 hours ago

        Even if they did track them down, then what?

        The world is huge, it’s unlikely that a particular attacker is going to be from the same country, so how are they going to do anything about it, really?

        The victim can report to the government local to the hackers, but that local government is under no real obligation to do anything about it.

        • mjr@infosec.pub
          link
          fedilink
          English
          arrow-up
          4
          ·
          23 hours ago

          The victim can report to the government local to the hackers, but that local government is under no real obligation to do anything about it.

          And given this, why would most companies keep paying their defenders to hunt them down once the trail seems to end in a foreign country?

          Defence is seen as a cost that reduces other costs, rather than something which will pay back, so I suspect it only happens if the company doesn’t have other work for the defenders to do (rare) so they might as well work on this as be paid to do nothing, if they think the attackers may return so they want to learn as much as possible about them for future defence (depends on what they did and who they it seems they may be), or if the government where the company is based steps in to fund the hunt for some reason (maybe political).

        • ArmchairAce1944@discuss.onlineOP
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          8
          ·
          22 hours ago

          I find it difficult to believe that all attackers are necessarily from different countries. There was a breach in Canada some years ago when a bank lost tons of information and was hated for it. The hackers were in canada and it was on the news when they were finally caught. But that was an exception and not the rule.

          • Danquebec@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            2
            ·
            14 hours ago

            It was a credit union, and it was an insider leak.

            Or you’re thinking of another financial institution in Canada that lost a lot of information and whose reputation suffered as a result.

          • CentipedeFarrier@piefed.social
            link
            fedilink
            English
            arrow-up
            7
            ·
            22 hours ago

            I don’t recall saying all attackers were necessarily from different countries, because that’s not true at all. I said it’s unlikely they are from the same one, because statistically that is true.

  • Caveman@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    ·
    16 hours ago

    Is it really so hard to self host the analytics with an open source analytics solution? I don’t know why people at any scale of more than 15 devs would want that kind of security risk.

  • scytale@piefed.zip
    link
    fedilink
    English
    arrow-up
    15
    ·
    edit-2
    24 hours ago

    IMO the problem with companies doing “fast” technology (i.e. AI) do so by pushing security aside to get things through the pipeline and into production as quickly as possible. Security has always been a “blocker” to development teams because it slows them down with all the, you know, requirements to make a product/application secure. Unless you have security-minded leads or a security representative in the C-suite (i.e. CISO) who has significant influence, half-baked and insecure products will continuously be pushed out.

    • northernlights@lemmy.today
      link
      fedilink
      English
      arrow-up
      4
      ·
      21 hours ago

      Yep and then devs solved the problems of these damn IT sec people getting in the way and created “SecDevOps”. Oh it’s lean and Agile and everything but it’s dev and sec and production all in the same bucket with all the well known problems of pushing things too fast and not checking or testing enough (see CloudFlare etc).

  • TrackinDaKraken@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    1
    ·
    23 hours ago

    Never used AI online, never will. I played with a locally installed, air-gapped, Deepseek just to see what it was like, because I don’t trust it at all. Meh.

    I don’t get the hype.

    Y’all have fun with that, I’m going to avoid it as much as I can.

    • MrSmith@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 hours ago

      This is pretty much the reaction of most people. And the number of such people is increasing (as they are finishing up on “playing”)