On Tue, Oct 6, 2015 at 6:43 AM Edward Ned Harvey (lopser) <
lop...@nedharvey.com> wrote:

>  In this case, it was hackers planting a malicious DLL to capture
> plaintext passwords received during HTTPS login sessions, but there's
> nothing preventing bad employees from doing this exact type of thing - by
> editing a PHP file or whatever.
>
Employees of "the company" already have access to all your information.
They manage the application that stores the data and, we should assume, can
do anything they want with it. By storing our data with an application
provide we are already trusting everybody at the company to do the right
thing with our data and our password. Even if they implemented this
proposal.

If a malicious actor can plant a DLL that captures passwords they could
plant a DLL that captures session data and any data that you send to/from
the service.

And there will always be bad actors in a company, sometimes that might be
the C*O, who won't improve their security for a variety of self-serving
reasons. As consumers we need to be careful about what information we give
away and how much we trust that company to do the right thing with our
data.

I am all for increased security but I'm having a hard time finding the
value in this. It could mitigate password re-use, a password compromised in
one place used to exploit an account in another place, but using
service-specific passwords already does that.

-- 
Perfection is just a word I use occasionally with mustard.
--Atom Powers--
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to