GG Apple...

Konohas Perverted HermitKonohas Perverted Hermit Join Date: 2008-09-26 Member: 65075Members
edited March 2012 in Off-Topic
<div class="IPBDescription">iTunes, hacked?</div>So it appears that Apple's security for iTune's has been compromised.

<!--quoteo--><div class='quotetop'>QUOTE </div><div class='quotemain'><!--quotec-->Dear <b>NAME</b>,

Your Apple ID, <b>EMAIL</b>, was just used to make a purchase in 宠物猎人 from the App Store on a computer or device that had not previously been associated with that Apple ID.<!--QuoteEnd--></div><!--QuoteEEnd-->

I am not the only person...

<a href="http://www.multipleshotsfired.com/blog/2012/3/6/your-apple-id-has-been-disabled-translation-youve-been-hacke.html" target="_blank">http://www.multipleshotsfired.com/blog/201...been-hacke.html</a>
<a href="https://www.google.com/search?hl=en&safe=off&biw=1440&bih=820&q=%E5%AE%A0%E7%89%A9%E7%8C%8E%E4%BA%BA+unauthorized+purchase+itunes&oq=%E5%AE%A0%E7%89%A9%E7%8C%8E%E4%BA%BA+unauthorized+purchase+itunes&aq=f&aqi=&aql=&gs_sm=3&gs_upl=12273l18145l0l18364l30l30l1l0l0l0l222l3416l13.12.4l29l0&gs_l=serp.3...12273l18145l0l18364l30l30l1l0l0l0l222l3416l13j12j4l29l0.llsin" target="_blank">Google Search result</a>

Comments

  • That_Annoying_KidThat_Annoying_Kid Sire of Titles Join Date: 2003-03-01 Member: 14175Members, Constellation
    bootsie


    lets see how this develops
  • Chris0132Chris0132 Join Date: 2009-07-25 Member: 68262Members
    Nice of them to let you know after the fact.

    Rather than say, not letting you do that without email authorisation in the first place...
  • TemphageTemphage Join Date: 2009-10-28 Member: 69158Members
    edited March 2012
    What exactly is their "security" and how would that seriously stop someone from just breaking passwords as they always do? I've had more than one gmail account hacked because the passwords were simple letters (though it was a gibberish, made-up word). I've seen taken to using l33t-speak to create passwords I can remember but are nearly impossible to crack like:

    $TuM|3leBu7T

    Problem is a lot of sites don't allow symbols in PWs.... also, memorizing them is a pain in the ######. But hey, who knew that l33t would be good for anything?
  • Chris0132Chris0132 Join Date: 2009-07-25 Member: 68262Members
    <!--quoteo(post=1913171:date=Mar 15 2012, 12:43 PM:name=Temphage)--><div class='quotetop'>QUOTE (Temphage @ Mar 15 2012, 12:43 PM) <a href="index.php?act=findpost&pid=1913171"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->What exactly is their "security" and how would that seriously stop someone from just breaking passwords as they always do? I've had more than one gmail account hacked because the passwords were simple letters (though it was a gibberish, made-up word). I've seen taken to using l33t-speak to create passwords I can remember but are nearly impossible to crack like:

    $TuM|3leBu7T<!--QuoteEnd--></div><!--QuoteEEnd-->


    Also also nearly impossible to remember. It also doesn't do anything against brute force approaches because they don't care how obscure your password is, only its length.
  • SvenpaSvenpa Wait, what? Join Date: 2004-01-03 Member: 25012Members, Constellation
    <!--quoteo(post=1913186:date=Mar 15 2012, 03:27 PM:name=Chris0132)--><div class='quotetop'>QUOTE (Chris0132 @ Mar 15 2012, 03:27 PM) <a href="index.php?act=findpost&pid=1913186"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->Also also nearly impossible to remember. It also doesn't do anything against brute force approaches because they don't care how obscure your password is, only its length.<!--QuoteEnd--></div><!--QuoteEEnd-->

    So I could just use "Aa4AAAAAAAAAAAAAA" as a pass and it will be SUPER strong in the face of a brute force attempt? The "a4" just to throw off guessing a bit.
  • lolfighterlolfighter Snark, Dire Join Date: 2003-04-20 Member: 15693Members
    edited March 2012
    Brute force password cracking tend to use slightly more sophisticated methods than just iterating through every character known to man. They start with only the standard english alphabet, then alphanumeric, then including symbols, and so on. Capital letters are also omitted at first because many passwords are all lowercase.

    So yes, the strength of your password against brute force attacks does depend on more than its length.

    For that matter, if brute-forcing even works at all, that is truly and utterly pathetic on the part of whoever is running security, considering how easy it is to defeat.
  • ZenoZeno Join Date: 2007-09-05 Member: 62183Members
    <!--quoteo(post=1913171:date=Mar 15 2012, 01:43 PM:name=Temphage)--><div class='quotetop'>QUOTE (Temphage @ Mar 15 2012, 01:43 PM) <a href="index.php?act=findpost&pid=1913171"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->I've had more than one gmail account hacked because the passwords were simple letters (though it was a gibberish, made-up word). I've seen taken to using l33t-speak to create passwords I can remember but are nearly impossible to crack like:
    $TuM|3leBu7T<!--QuoteEnd--></div><!--QuoteEEnd-->
    <a href="http://xkcd.com/936/" target="_blank">Relevant XKCD</a>

    If your password has been hacked several times I'd suggest you search your PC for trojans and keyloggers and stuff...
    Also update all your software. Don't trust any ###### firefox addon, use virtualbox for unknown software.
  • Chris0132Chris0132 Join Date: 2009-07-25 Member: 68262Members
    edited March 2012
    <!--quoteo(post=1913204:date=Mar 15 2012, 04:26 PM:name=Svenpa)--><div class='quotetop'>QUOTE (Svenpa @ Mar 15 2012, 04:26 PM) <a href="index.php?act=findpost&pid=1913204"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->So I could just use "Aa4AAAAAAAAAAAAAA" as a pass and it will be SUPER strong in the face of a brute force attempt? The "a4" just to throw off guessing a bit.<!--QuoteEnd--></div><!--QuoteEEnd-->

    Well, I'd suggest using letters closer to the end of the alphabet but probably, yeah.

    <!--quoteo(post=1913205:date=Mar 15 2012, 04:32 PM:name=lolfighter)--><div class='quotetop'>QUOTE (lolfighter @ Mar 15 2012, 04:32 PM) <a href="index.php?act=findpost&pid=1913205"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->Brute force password cracking tend to use slightly more sophisticated methods than just iterating through every character known to man. They start with only the standard english alphabet, then alphanumeric, then including symbols, and so on. Capital letters are also omitted at first because many passwords are all lowercase.

    So yes, the strength of your password against brute force attacks does depend on more than its length.

    For that matter, if brute-forcing even works at all, that is truly and utterly pathetic on the part of whoever is running security, considering how easy it is to defeat.<!--QuoteEnd--></div><!--QuoteEEnd-->

    To an extent, but it's much easier to remember say, the <a href="http://www.youtube.com/watch?v=Z0GFRcFm-aY" target="_blank">lyrics to an REM song</a> than some weird alphanumeric sequence, and it'll be about as hard to crack.
  • AlignAlign Remain Calm Join Date: 2002-11-02 Member: 5216Forum Moderators, Constellation
    Something like ThereAre4Lights would actually be a pretty good password wouldn't it?
  • Chris0132Chris0132 Join Date: 2009-07-25 Member: 68262Members
    Yes probably.

    I mean, if you avoid using extremely obvious phrases, so that words can be treated like an alphabet, you essentially are creating a password where, in equivalence, the number of words = the number of letters, except in an alphabet where the number of letters is so huge that even a three or four letter long word would take forever to guess if you used random letter combinations.

    There are far more words out there than there are letters even in the most extensive ascii alphabet, and words are easier for humans to remember, and we don't have the technology to construct sensible sentences yet, so even just writing a short sentence as your password would be one of the most secure methods against any cryptographic apporoach to cracking it.

    Of course, there is <a href="http://xkcd.com/538/" target="_blank">another relevant xkcd strip</a>. No matter how mathematically strong your password is, you still have to take into account that people will cheat and just record you entering it/beat you up until you tell them it.
  • Konohas Perverted HermitKonohas Perverted Hermit Join Date: 2008-09-26 Member: 65075Members
    <!--quoteo(post=1913171:date=Mar 15 2012, 05:43 AM:name=Temphage)--><div class='quotetop'>QUOTE (Temphage @ Mar 15 2012, 05:43 AM) <a href="index.php?act=findpost&pid=1913171"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->What exactly is their "security" and how would that seriously stop someone from just breaking passwords as they always do? I've had more than one gmail account hacked because the passwords were simple letters (though it was a gibberish, made-up word). I've seen taken to using l33t-speak to create passwords I can remember but are nearly impossible to crack like:

    $TuM|3leBu7T

    Problem is a lot of sites don't allow symbols in PWs.... also, memorizing them is a pain in the ######. But hey, who knew that l33t would be good for anything?<!--QuoteEnd--></div><!--QuoteEEnd-->

    My passwords are always over 8 characters and consist of capital letters as well as numbers. So I doubt that "easy" to crack bit.
  • TalesinTalesin Our own little well of hate Join Date: 2002-11-08 Member: 7710NS1 Playtester, Forum Moderators
    <!--quoteo(post=1913253:date=Mar 15 2012, 12:49 PM:name=Align)--><div class='quotetop'>QUOTE (Align @ Mar 15 2012, 12:49 PM) <a href="index.php?act=findpost&pid=1913253"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->Something like ThereAre4Lights would actually be a pretty good password wouldn't it?<!--QuoteEnd--></div><!--QuoteEEnd-->
    It would if it wasn't a common phrase. My own passwords use XKCD plus numeric/symbol salting.
    One I've used before is Jello@TABLE2plug!, which is fairly easy to remember by the simple mnemonic of a jello cork in a hole in a table. Mixing around word-case, symbol/number location, symbol/number count and so on with each password change. It's also strong against dictionary attacks, rainbow tables, and is IMMENSELY stronger against a brute-force than |3SHw3E! would be, as it's 17 characters long instead of only 8.

    In fact, until it was put up here on the forum, it would be considered an 'uncrackable' password due to length and complexity, with today's computing power. Now that it's visible, it's no longer a viable password and I also can't use that exact capitalization or salting format again.
  • [WHO]Them[WHO]Them You can call me Dave Join Date: 2002-12-11 Member: 10593Members, Constellation
    The system I use seems to defeat lots of the common problems I'm aware of.

    I have a dropbox account with a super ridiculously long generated password that I'll never remember.
    In that dropbox account is a keypass database with an even longer ridiculously long generated password I'll never remember, and the anti-bruteforce cycle count is set to take a couple million cycles.
    In that keypass database are generated passwords for all the sites I frequent, generated to meet the maximum security supported by the individual sites.

    I have an offline copy of the dropbox database and a semi-weakly passworded database with a ridiculously long number of cycles for anti-bruteforce. That semi-weak database only contains the password for the dropbox database.

    For each individual computer I trust. I copy the semi-weak database to and link to dropbox.
    Lastly, I let my guard down in the browser step and let chrome remember my passwords.

    So, logging in for a site I haven't visited on the computer goes like this. Open the semi-weak with a memorized password, wait a few seconds for that to open due to the anti-bruteforce cycles. Copy the dropbox database password and open the dropbox database with it. Copy password for site. Login.

    At no point did I type the password for the site or the dropbox database (defeat keylogger). Someone needs access to MY computer (either physically or compromising chrome) as a first step to breaking this setup. Which severely cuts down on random hacks. I guess someone could also bruteforce my dropbox database (assuming dropbox itself has another lapse in their login security), but the password is strong enough that I'm writing that off as a mathematical impossibility for the forseeable future.

    On top of this I also have 2 IronKey thumb drives for the "nobody can know this information ever" stuff. They nuke their data if you fail to get the password right 10 times.
  • TemphageTemphage Join Date: 2009-10-28 Member: 69158Members
    Actually, wouldn't passwords with simple patterns on the keyboard be pretty effective? I doubt most cracking programs would consider it.

    Something like:

    !QAZ2wsx#Edc4rFV

    ?
  • [WHO]Them[WHO]Them You can call me Dave Join Date: 2002-12-11 Member: 10593Members, Constellation
    <!--quoteo(post=1913431:date=Mar 15 2012, 03:53 PM:name=Temphage)--><div class='quotetop'>QUOTE (Temphage @ Mar 15 2012, 03:53 PM) <a href="index.php?act=findpost&pid=1913431"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->Actually, wouldn't passwords with simple patterns on the keyboard be pretty effective? I doubt most cracking programs would consider it.

    Something like:

    !QAZ2wsx#Edc4rFV

    ?<!--QuoteEnd--></div><!--QuoteEEnd-->


    The problem with assuming a pattern is safe relies entirely on the statistics of it. If it's a pattern that a nontrivial percentage of people are likely to use, then consider it compromised. Crackers will pursue the paths of least resistance.
  • That_Annoying_KidThat_Annoying_Kid Sire of Titles Join Date: 2003-03-01 Member: 14175Members, Constellation
    how are them ironkeys working out for you

    I peeped on the product line a while back


    The thing I liked the most was the little things that physically block access to cat5 ports in your network so you can control access
  • [WHO]Them[WHO]Them You can call me Dave Join Date: 2002-12-11 Member: 10593Members, Constellation
    <!--quoteo(post=1913446:date=Mar 15 2012, 04:15 PM:name=That_Annoying_Kid)--><div class='quotetop'>QUOTE (That_Annoying_Kid @ Mar 15 2012, 04:15 PM) <a href="index.php?act=findpost&pid=1913446"><{POST_SNAPBACK}></a></div><div class='quotemain'><!--quotec-->how are them ironkeys working out for you

    I peeped on the product line a while back


    The thing I liked the most was the little things that physically block access to cat5 ports in your network so you can control access<!--QuoteEnd--></div><!--QuoteEEnd-->


    No complaints, although they've never even been physically compromised to my knowledge. So they work as intended for the "a trusted user accessing your data" side of thing.
  • That_Annoying_KidThat_Annoying_Kid Sire of Titles Join Date: 2003-03-01 Member: 14175Members, Constellation
    edited March 2012
    no that was a separate enterprise product for blocking open rj-45 ports in your building


    Ironkeys with the hardware encryption always seemed cool, but I bet $5 wrench and druuugs gets thru all the fancypants


    [edit]
    NS STYLE DISTRACTION: I was reminiscing about [who]modified a few days ago
    [/edit]
  • sheena_yanaisheena_yanai Join Date: 2002-12-23 Member: 11426Members
    edited April 2012
    <center><object width="450" height="356"><param name="movie" value="http://www.youtube.com/v/K95SXe3pZoY"></param><embed src="http://www.youtube.com/v/K95SXe3pZoY" type="application/x-shockwave-flash" width="450" height="356"></embed></object></center>
Sign In or Register to comment.