How is this company not being criminally prosecuted?
The powers-that-be are still busy busting Apple over monopolistic practices. It will take years. The Facebook crimes are very minor in comparison.
How is this company not being criminally prosecuted?
Unfortunately, there's no direct law for that yet as far as I know.How is this company not being criminally prosecuted?
Facebook today announced that during a routine security review it discovered "some user passwords" were stored in a readable format within its internal data storage systems, accessible by employees.
As it turns out, "some user passwords" actually means hundreds of millions of passwords. A Facebook insider told KrebsOnSecurity that between 200 and 600 million Facebook users may have had their account passwords stored in plain text in a database accessible to 20,000 Facebook employees. Some Instagram passwords were also included, and Facebook claims many of the passwords came from Facebook Lite users.
![]()
Facebook says that there's no "evidence to date" that anyone within Facebook abused or improperly accessed the passwords, but KrebsOnSecurity's source says 2,000 engineers or developers made around nine million internal queries for data elements that contained plain text user passwords.
Facebook employees reportedly built applications that logged unencrypted password data, which is how the passwords were exposed. Facebook hasn't determined exactly how many passwords were stored in plain text, nor how long they were visible.
Facebook plans to notify users whose passwords were improperly stored, and the company says that it has been looking at the ways certain categories of information, such as access tokens, are stored, and correcting problems as they're found.
"There is nothing more important to us than protecting people's information, and we will continue making improvements as part of our ongoing security efforts at Facebook," reads Facebook's blog post.
Facebook and Instagram users who are concerned about their account security should change their passwords, using unique passwords that are different from passwords used on other sites. Facebook also recommends users enable two-factor authentication.
Article Link: Facebook Stored Hundreds of Millions Passwords in Plain Text, Thousands of Employees Had Access
Facebook is just a one big security risk. Either your data is being intentionally used to profile you or they are unintentionally leaking it or just failing to keep it secure. Oh, I almost forgot... there is always a good chance one of their partners goes “Camebridge Analytica” on you and sells your data to foreign power or something similar. Why an earth people give all that data to Facebook. Mark Zuckerberg knows, it’s because “people are dumb f*cks”.
Consider my mind blown.
![]()
Good advice, except that this will not help in the case of Facebook. The problem this time is that they have been shown to store passwords on the server side in plain text format. No matter how complex your password is in such as case, they will have easy access to it—it is 100% readable to them.
It's kind of like the person at the office who writes their passwords on Post-Its and sticks them on their computer screen or desk. Everyone in the office has easy access. Free and easy to do whatever they please.
That's the reason for 2FA. Even if they have the Facebook password. It's not of too much use.
Never had an account to begin with and loathed them from the beginning.
Now I just need to convince my pals to move out from WhatsApp and then I can give them the middle finger gesture. (Edit note: fixed a typo)
Yes. At this point, storing non-hashed passwords should be a criminal offense. Period. The CEO and Chief Engineer of any firm doing it should get jail time for it. That will stop it. This isn't rocket science either, the protocols to make this kind of thing impossible are pretty well known.
GAWD I HATE this company.
Who even still has a FB account?
While many are saying "is anyone surprised" I actually am at this.
This is one of the largest corporations in the world, whose sole business is its internet applications, and they ignored one of the most basic security expectations of hashing a password?
That is absolutely surprising and shameful and there is no excuse from them that is acceptable.
GIF master at work. One of my prime reasons to be here is AngerDanger.Consider my mind blown.
![]()
This is not accurate. When the users enter their passwords in a web form for logging in, it briefly exists in clear text on the web servers. That is difficult to avoid in a secure way (client-side crypto in the browser using Javascript has its own security issues). That's where the erroneous logging apparently happened.If they had followed basic security procedures they never would have the passwords anywhere on their network.
I'm sure that's what they store in their credential database.Instead they’d have a hashed, salted key derivable from the password and the user’s account ID.
Disgusting.
Use privacy enhancing tech or pay the price, in future privacy will be currency.
* GPG
* Veracrypt
* Monero
* VPN
* DuckDuckGo
* Pi.hole
Signal, secure end to end encrypted messaging and callingWhat do people recommend as a secure cross-platform alternative to WhatsApp?