Only one interview about the iCloud security breach of celebrities’ private photos exists: with the Wall Street Journal’s Tim Cook. Because of a lack of information, most people believe their personal data is protected by whatever is written in the terms of service or, alternatively, the privacy policy. But today’s technology has become standardized, to the point that most corporations, private companies and others use the same security settings to the detriment of their users. Is it complacency of the company withholding the data? Not exactly.
The problem lies in the letter of the law. More explicitly, the Patriot Act in which Internet providers/gateways are mandated by law to keep records on their subscribers. In short, your Internet provider is the easiest company/person to build an online profile of you. Or hijack your identity.
What about encryption? If you recall, the previous article about HeartBleed discussed encryption, a/k/a SSL, as it is commonly known. SSL has chinks in its armor, and through this data is breached. That’s why there will always be a way to exploit privacy.
As for the iCloud scenario, Apply simply locked the front door correctly but didn’t securely enforce its side door. So, by consistently retrying the password to iCloud, people were able to breach security. It’s a common practice by programs to attempt dictionary attacks (words used in the dictionary).
The breach is now secured by 2nd Factor Authentication, which in short means you cannot login without receiving a cell phone text message, or phone call then inputting the randomized code. You can overcome this as the video illustrates:
The question that I believe escapes everyone’s grasp is, “What type of content are you placing onto the internet?” Is it objectionable or not? Back in 2007, I realized how much was being placed online, thus I felt it was VERY appropriate to game the system. By gaming the system, I would be myself as well really positive or utterly boring when online. I was very aware that employers were looking onto Myspace, Friendster, as well my email addresses. In this way, the worst anyone could gleam is my lifestyle is mundane. Years ago, I also complained about a girlfriend or two. The rest, quite simply, is dull. So learn to use in your favor the fact that everything is recorded online.
In an example of the dark side, I as a tech person familiar with P2P technology can download, as seen within, screenshots of the celebrity iCloud leaks. I do in my heart of hearts believe there is no true privacy, you can only create a false dichotomy by believing you can have privacy. Remember these incriminating and not incriminating things will exist far beyond most our lifetimes. In short, we should examine how we live, or what we reveal
.
For more information about the iCloud hack, the videos below should be helpful.