They’re blaming customers for not having good cybersecurity practices instead of themselves for not having good cybersecurity practices.

  • The Bard in Green@lemmy.starlightkel.xyz
    link
    fedilink
    English
    arrow-up
    32
    arrow-down
    1
    ·
    9 months ago

    From a PSA stand point, 23andMe makes a really good point here.

    From a Legal / Responsible Data Custodian perspective, it’s the same collective responsibility bullshit that the oil industry likes to shit out about climate change.

      • starman2112@sh.itjust.works
        link
        fedilink
        arrow-up
        7
        ·
        9 months ago

        The issue isn’t just reuse of passwords. Only about 14,000 accounts were breached because of bad passwords. The problem is that those 14k accounts allowed bad actors to access the personal information of nearly 7 million people. It’s less “you shouldn’t have reused your password,” it’s more “your neighbor’s cousin’s sister-in-law’s nephew shouldn’t have reused his password”

        • dream_weasel@sh.itjust.works
          link
          fedilink
          arrow-up
          2
          arrow-down
          1
          ·
          9 months ago

          … And you should not opt in to sharing data with people whose security practices you don’t know.

          Don’t print your SSN and give it to your inlaws or your grandma. Or your credit card info or anything else.

    • GrundlButter@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      7
      ·
      9 months ago

      While it’s not the point 23andMe wants to make here, it is an absolutely horrible idea to allow a company to access, catalog and sell your DNA information. Shame they didn’t touch on that point.

    • doppelgangmember@lemmy.world
      link
      fedilink
      arrow-up
      17
      ·
      9 months ago

      Uhh yeah you can…

      Mandatory 2FA with phone and password retry count. If it’s targeted using breach data of email/passwords then the 2FA should still stop the majority…

      • brbposting@sh.itjust.works
        link
        fedilink
        arrow-up
        1
        ·
        9 months ago

        Shouldn’t service providers be hashing the plaintext passwords that show up in dark web leaks to see if matching users reused those passwords?

        • folkrav@lemmy.ca
          link
          fedilink
          arrow-up
          4
          ·
          9 months ago

          Wouldn’t really be of any use if they’re doing things right and salt their hashes

  • brettvitaz@programming.dev
    link
    fedilink
    arrow-up
    5
    ·
    9 months ago

    Yeah, users have some of the blame, but 23andme shares responsibility by not having basic detection of bad actors. Some things that come to mind are rate limits, alarms on strange user login behavior, watching for mass logins from an unexpected region, excessive bad password attempts across a large number of users.