Wednesday, September 3, 2014

Filtration of intimate images of famous actresses and tarnishes the … – The World

The compromising photos of actress Jennifer Lawrence and other famous actresses and leaked in recent days have meant Red to torpedo an entire confidence in remote storage services (call ‘cloud’) , and has also been a image problem for Apple , less than a week for their annual event, eagerly awaited.

These images’ stolen ‘web storage services were broadcast on a message in the forum 4Chan by anonymous users, who claimed that they were obtained from iCloud accounts-service storage the cloud of Apple- Lawrence and other famous Kate Upton and Mary Elizabeth Winstead .

Apple has ensured that rule out a security flaw in its services or iCloud Find my Phone, but in certain cases (and “after more than 40 hours of research “) found that” certain accounts of celebrities were compromised by a very specific attack usernames, passwords and security questions practice that has become very common in Interne t, “said a statement.

That is, The company blames weak passwords or security questions too obvious the origin of the entry of third parties in private accounts of the famous victims of this leak, which has exposed the multitude of intimate images that were not originally made for broadcast Network.

This leak caused further outrage logic victims which they quickly express their frustration and anger through social networks opening an investigation both by Apple and by the American FBI itself.

Access Security the cloud

According to Reuters, a result of this violation of privacy ‘online’ various security experts and mobile developers have put the emphasis on security issues in the cloud . In fact, some criticize Apple for not providing even greater access to additional security measures, such as two-step authentication, which requires independent verification code to your mobile users -enviada SMS- by trying to login.

“Making the process more private or secure by default instead of ‘security options’ to be activated desirable, most users do not activate those options and sometimes their availability is not clearly announced “commented Matt Johansen , head of the Research Center of WhiteHat Security, who suggests that this type of option of reinforcing security is somewhat ‘hidden’ for normal user.

‘is not an exaggeration’ distrust because, really, ‘we do not know where they go our data ‘

Think something similar independent security consultant Jesus Molina , who told EFE said that “it is no exaggeration” unleashed distrust among some users after this incident because, really, “will not know where our data” . In addition to “many people have things cloud unknowingly” as there are smart phones where “location services are enabled by default”, and considered that companies “play our laziness and ignorance “.

” We can hardly go to the settings, see if it is activated, if it is not activated … “Molina said, but considered that this incident” will to help people to see what they have. ” This expert thinks as users “would have to become more involved” and read all conditions that companies have when we get off an application. For enterprises “should be a way you could know what data you are sending your phone , easy and simple. Which we are sending what source.”

Meanwhile, the American Civil Liberties Union (ACLU) pointed out that Apple, Google and other big technology companies should know that “millions of users often use” products for “intimate” and “sensitive” activities, so should offer options to prevent private photos to the cloud climb.



Confidence

Confidence in the data security of citizens in the Red -famosos or not is an extremely sensitive issue: earn it’s complicated, but it is very easy to lose. Again recover costs even more work . “We are in a time when the ‘hackers’ attempt to access our confidential data and celebrities are particularly vulnerable , such as political and business leaders,” he told AFP Jules Polonetsky , executive director of think tank ‘The Future of Privacy’.

Perhaps the fact that celebrities are victims of this type of privacy attacks ‘online’ help put a face to a problem that potentially affects all citizens . The same recommendations for them used, in fact, for all, and thanks to the interest in your image can help convey the message.

‘Everything is’ hackable’. Nothing is certain (or removed) deforms permanently ‘

Speaking to AFP, the lawyer Gloria Allred , specializing in cases of discrimination and sexual assault (has defended the Sacha Baron Cohen, Anthony Weiner or political star and former California Governor Arnold Schwarzenegger), beat out the most drastic recommendations given to clients. “ Everything is ‘hackable’ . Nothing is safe (or removed) in a permanent” memory. “If you would not see (these documents) on the cover of newspapers, do not send them by unencrypted email, do not store them in the remote services (” cloud “) or even mobile phone,” he added.

“The vulnerability of passwords is at the origin of the last cases of stolen photos” said Jules Polonetsky. In the case of the famous sometimes it’s easier to access their accounts, for example, from the service password recovery if you forget it. often arise ‘security questions’ that deal with personal information in the case of celebrities, public domain . “Everybody knows where you are born, what is the name of your pet, you go to school,” said Polonetsky.

Other recommendations to increase control over the privacy of our online services are change passwords often use different passwords to different services, and vitar that are too obvious or easy to obtain, and enable two-factor authentication steps whenever possible.

Brandwatch, a company that analyzes sentiment in social networks, blogs and other sites in the USA, shows the consequences of an act as filtration compromising celebrity photos stored on your remote service on the opinion of a significant proportion of consumers. Before the news of this leap filtration, for example, the company received very few negative mentions on Twitter, a testament to its strong brand in the United States. However, in the past three days, at least 17,000 mentions on Twitter were related to the violation of security. 7,600 of these ‘tweets’ specifically mention Apple. Some of the negative words associated with mentions of Apple’s iCloud service include ‘rape’, ‘disgusting rape’, ‘crime’, ‘failure’, ‘technical problem’ and ‘disappointment’. The Brandwatch spokeswoman Dinah Alobeid said that his measurement system difference between negative and neutral ‘tweets’ by analyzing keywords. There were three times more negative mentions than positive in relation to the incident. Apple has dealt with several missteps in recent years, including the lack of precision of its mapping service and the famous ‘Antennagate’, where a malfunction of the iPhone 4 antenna was exposed.

LikeTweet

No comments:

Post a Comment