Robaron mi contraseña. Quizá también la tuya.

Robaron mi contraseña. Quizá también la tuya.

Understanding Cybersecurity Vulnerabilities

Introduction to Personal Experience with Cybersecurity

  • The speaker shares their personal experience as a victim of cybersecurity issues, emphasizing the seriousness of the problem and its relevance to viewers.
  • They aim to demonstrate how easily passwords can be stolen using a mobile phone, highlighting the poor security practices of large companies.

Historical Context and Discovery

  • The speaker reflects on discovering these vulnerabilities over a decade ago, mentioning an old blog post that discussed password management issues in major companies.
  • They express frustration that despite raising awareness 12 years ago, the same security flaws persist in the company they used for their mobile service.

Current Situation and User Awareness

  • The speaker recounts their ongoing efforts to address these security concerns with the company but feels ignored.
  • They illustrate the process of obtaining a new SIM card and creating an account, stressing how many users rely on companies to handle their passwords securely.

Password Management Practices

Password Creation and Company Handling

  • The speaker creates a simple password ("tortuga 1 2 3") for demonstration purposes, questioning common user practices regarding password complexity.
  • They explain what happens internally when a company receives user data, ideally storing it securely but often failing to do so.

Insecure Storage Options

  • Two insecure methods of storing passwords are outlined:
  • Storing them in plain text allows any employee access.
  • Encrypting them with a key still poses risks if hackers gain access to both data and keys.

Hashing Techniques Explained

  • The discussion shifts to hashing functions as better alternatives for password storage:
  • Hashing converts passwords into fixed-length strings that cannot be reversed back into original text.
  • However, identical passwords yield identical hashes, making them vulnerable if attackers use precomputed tables.

Advanced Security Measures

Enhancements in Hashing Methods

  • More secure practices involve adding random elements (salts) to each password before hashing. This makes precomputed attacks less effective.

Modern Approaches to Password Security

Password Security and Recovery Issues

Password Storage Options

  • Discusses alternatives to password storage, such as using login buttons for Google or Facebook to avoid the hassle of managing passwords.
  • Introduces a real-world example where users can check if their email has been involved in any data breaches, highlighting the importance of monitoring personal information.

Data Breaches and Password Hashing

  • Explains that many services have suffered from hacks, with specific examples like Tumblr and Dropbox using bcrypt for hashing passwords, which is considered secure.
  • Questions the security practices of a telecommunications provider regarding their password hashing methods over the years.

Vulnerabilities in Password Management

  • Describes receiving an SMS with a password, indicating potential vulnerabilities in how companies handle user credentials.
  • Expresses frustration about long-standing issues with password security within the company and mentions human error when leaving devices unattended.

Reporting Security Issues

  • Narrates an attempt to report a security issue through an app but encounters difficulties due to unresponsive features.
  • Shares experiences of trying to communicate problems via email but facing obstacles like non-existent accounts.

Corporate Response to Security Concerns

  • Highlights past incidents where users reported similar issues on social media platforms without satisfactory responses from the company.
  • References a significant breach at T-Mobile in 2018, where user passwords were exposed in plaintext despite warnings from customers about potential risks.

Understanding User Experience and Company Policies

  • Analyzes why companies may prioritize ease of use over security measures, especially for less tech-savvy customers who might struggle with complex recovery processes.

Concerns About Data Security and Company Accountability

Misuse of Personal Information

  • The speaker discusses instances where individuals with access to personal information have misused it, highlighting a lack of trust in data security practices.
  • There is skepticism regarding password recovery processes, suggesting they are merely superficial measures that do not genuinely protect user data.

Password Storage Practices

  • The speaker expresses concern that passwords may be stored insecurely, either in plain text or poorly encrypted formats, raising questions about the integrity of company security protocols.

Corporate Response to Complaints

  • The speaker notes that complaints made directly to telecom companies often go unaddressed, indicating a systemic issue within customer service and accountability.

Social Media as a Platform for Advocacy

  • The importance of using social media platforms like Twitter and YouTube to raise awareness about these issues is emphasized; sharing experiences can pressure companies into action.

Call to Action for Viewers

Channel: Ringa Tech
Video description

Una empresa con millones de usuarios maneja tus datos de una manera totalmente insegura. No es la única. En este video explico cómo me di cuenta del problema, por qué es un riesgo mucho más importante que solo un mal manejo de datos, y aprovecho para detallar cómo las empresas pueden almacenar tus contraseñas. Mira el primer comentario para posibles preguntas frecuentes. === CONTENIDO 00:00 La mezcla explosiva 00:42 Cómo me di cuenta 01:37 Revisando el problema 02:30 Opciones para almacenar contraseñas 06:22 Probando en el mundo real 07:27 La práctica ridícula de la empresa 08:17 Mi familiar me roba la contraseña 09:26 Intentando reportar el problema 10:40 También T-Mobile hizo lo mismo 11:25 ¿Por qué seguirán con este agujero? 13:37 Por qué no digo el nombre de la empresa Toda la información en este video es una opinión, basada en lo que revisé y encontré. Por favor revisa por tí mism@ y saca tus propias conclusiones. Iconos por: Vector Bazar, Good Ware, Vectors Market, Freepik en Flaticon.es #tecnología #seguridad #ciberseguridad