TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Equifax security freeze PINs are the timestamp of when you request the freeze

471 点作者 moonka超过 7 年前

20 条评论

encoderer超过 7 年前
True thing: until recently you could remove hard inquiries from your credit report merely by pulling your own credit so often in one month using an array of daily monitoring services that you would overflow the field and bump off legit inquiries.<p>I did this in 2009-10, it had been going on for a while, and lasted for a while but sadly I hear they&#x27;ve solved it seemingly by nightly batch job to remove your own credit pulls.<p>These companies are just barely functional for their purpose.<p>Experian seemed to have their act together a bit more.
评论 #15209144 未加载
评论 #15209753 未加载
评论 #15209257 未加载
评论 #15209250 未加载
Keeeeeeeks超过 7 年前
This is embarrassing at this point; a credit authority printing dividends is too busy placating shareholders to even pretend to give a shit about the data of the people who _involuntarily_ have their PII stored on their platform.<p>Whoever files a class action should make a motion such that anyone can purge their PII from a credit authority that&#x27;s experienced a public hack such that their PII was exposed, or some other sort of incentive for these too-big-to-improve companies to do their job
评论 #15209285 未加载
评论 #15209225 未加载
评论 #15208926 未加载
评论 #15208898 未加载
评论 #15210497 未加载
solomatov超过 7 年前
It&#x27;s time to have a mandatory certification for people who develop critical systems. After such certification, you can consider such an implementation a malpractice, and sue them for it (of course the penalty is paid by the insurance company which sold the malpractice insurance).<p>Doctors, lawyers, and many other professions have such system, why can&#x27;t we have it as well?
评论 #15208942 未加载
评论 #15209927 未加载
评论 #15209329 未加载
评论 #15208893 未加载
评论 #15210440 未加载
评论 #15209118 未加载
评论 #15209290 未加载
评论 #15209663 未加载
评论 #15208917 未加载
评论 #15209186 未加载
评论 #15210452 未加载
tvaughan超过 7 年前
And the hits just keep on coming...<p>www.equifaxsecurity2017.com uses an invalid security certificate.<p>The certificate is not trusted because the issuer certificate is unknown. The server might not be sending the appropriate intermediate certificates. An additional root certificate may need to be imported.<p>Error code: SEC_ERROR_UNKNOWN_ISSUER
评论 #15209248 未加载
评论 #15209189 未加载
评论 #15209193 未加载
评论 #15211334 未加载
rokhayakebe超过 7 年前
Something worth taking into consideration is these companies are not Engineering&#x2F;Tech companies at the core. They were probably born as paper-companies and digitized their operations later on. I am hoping for the day something and more appropriate for this age will make them irrelevant.
评论 #15208818 未加载
评论 #15208886 未加载
评论 #15209049 未加载
评论 #15208906 未加载
评论 #15208955 未加载
buildbot超过 7 年前
I am curious what programmer would make such a choice vs. calling random or asking the user.<p>However, while undeniably stupid, hopefully they have rate limiting in place so guessing the PIN would not be feasible even if you know the day the credit freeze was put into place.
评论 #15208591 未加载
评论 #15208907 未加载
评论 #15208795 未加载
评论 #15208671 未加载
评论 #15208620 未加载
anigbrowl超过 7 年前
I&#x27;d like if Equifax was just shut down and the assets redistributed to the affected parties. Shareholders have no incentive to hire ethical and competent managers if they don&#x27;t have to bear the losses stemming from bad decisions.
justherefortart超过 7 年前
Outsourcing&#x2F;H1b costing a lot more than they save is my guess.<p>If you develop in-house software, you ARE A SOFTWARE COMPANY, whether you want to be or not.<p>Amazing how this good old boy network still thinks like it&#x27;s 1970.
pcurve超过 7 年前
Serious question... if there are 3-5 attempt lock out, would this be any less secure than randomly generated number?
评论 #15208691 未加载
评论 #15209110 未加载
评论 #15208696 未加载
评论 #15208687 未加载
ulkesh超过 7 年前
It&#x27;s like the Keystone Cops are running Equifax. They are now a complete joke. And it&#x27;s sadly not funny.
withdavidli超过 7 年前
Anyone else confirmed this? Don&#x27;t know who Tony is, usually like more sources that a tweet.
评论 #15209040 未加载
评论 #15209195 未加载
评论 #15209000 未加载
评论 #15210269 未加载
paultopia超过 7 年前
At this point, I will be <i>legit shocked</i> if there aren&#x27;t actual lines forming around courthouses, full of plaintiff-side lawyers trying to get a piece of this unbelievably stupid and negligent company. Holy shit.
krzrak超过 7 年前
OK, what is &quot;Equifax security freeze&quot;?
评论 #15209078 未加载
评论 #15209005 未加载
chris_wot超过 7 年前
Whoa... one guy said on Twitter this was the case in 2007!!
评论 #15208915 未加载
nogbit超过 7 年前
The only solution is to put the data in our hands only and we authorize access to it on an as needed basis. It should not be centralized anywhere.
评论 #15221561 未加载
nytesky超过 7 年前
What would be the best credit monitoring service then? Any recs of ones that have their act together?
ryanqian超过 7 年前
What a joke.
mdip超过 7 年前
There are a few things here that <i>shouldn&#x27;t</i> surprise me[0], but do. A credit reporting agency&#x27;s one product is personal data (basically, it&#x27;s you). Leaking that data basically makes it worthless (or worth a lot less) and besides affecting the people who&#x27;s data was leaked[1], it damages the product of their competitors. You&#x27;d <i>think</i> that would be something that&#x27;s protected with <i>so many layers</i> that a breach of their web property wouldn&#x27;t make much of a difference[2].<p>At previous employers, without going into terribly much detail, we had an asset that was treated with the kind of security that something like this should have been treated with. It was on a segregated network that could only be accessed through proxy hosts, requiring two-factor authentication. The proxy hosts were hardened (only the specific, needed, services&#x2F;components installed&#x2F;running, audited and firewalled to death). The devices in the secure network could not see the corporate network, let alone the Internet and the corporate network&#x2F;internet could not see these devices. Even special &#x27;management interfaces&#x27; for corporate devices were segregated. This was <i>in addition</i> to all of the rigor put in to securing each endpoint.<p>Companies need to realize that security is purely a defense related behavior. You have to be &quot;perfect&quot; 100% of the time, but your attacker need only be right a small number of times. The goal is to <i>increase the number of times</i> an attacker has to be <i>right</i> to get at your data. From ensuring your database accounts can only execute specific things[2], that your web servers are hardened and isolated to limit exposure, to properly configured firewalls (including application-layer firewalls&#x2F;log analysis). And ensuring that employee access to high-value targets is as minimal as possible and protected thoroughly. There are both &quot;preventative&quot; and &quot;reductive&quot; technologies that need to be put in place. Preventative is designed to stop a breach, reductive is designed to ensure that if breached, the breach is either worthless (i.e. proper password hashing) or caught and interrupted before <i>all</i> of the data is exfiltrated. It&#x27;s a lot easier to explain to investors (and your fellow countrymen) that a couple of million user accounts were exposed than it is to explain that 124 million of them left.<p>From the <i>looks</i> of it, it appears Equifax treats security like most large, non-tech businesses -- an expense that should be cut as deeply as possible. It&#x27;s probably fitting that they have the word &quot;fax&quot; in their name. If I had a guess, they probably have mandatory security auditing requirements, they paid the least they could to meet that regulation, and got the answer they paid for (or found someone to give them the answer). I&#x27;ll also guess that this PIN issue will turn out <i>not</i> to be the worst of the security practices in place -- I mean, how many weeks did they wait to report this[3]?<p>[0] I have a few years&#x27; history at a large corporation working in and around security. I&#x27;ve seen the ugly, though I feel that we handled things very well (incredibly well compared against Equifax!)<p>[1] i.e. <i>not</i> their customers.<p>[2] I&#x27;m thinking in terms of a typical SQL server, where one can eliminate table&#x2F;view level access in favor of stored procedures that limit what they provide and require a level of knowledge of the operation of the system (and can be tracked by logging in a manner that identifies behavior that&#x27;s not normal).<p>[3] And is it just me being overly cynical or does anyone else think that they waited until a historic hurricane would dominate the news cycle before going public with it? It was pretty good timing, really -- coming right off of Harvey and right into Irma, it&#x27;s easy to miss this story among the other big news (one &#x27;general news&#x2F;politics&#x27; site that I expected to see <i>all kinds</i> of headlines on had it quite low on the fold for a day and nowhere to be found, today). Or maybe they were just waiting to give time for more of their higher-ups to sell stock. &#x2F;s
Axsuul超过 7 年前
Calling all hackers, brute force much?
bitxbitxbitcoin超过 7 年前
Equifax is also the only one out of the big three that shows your SSN in plaintext while you type it in on that online request form. They&#x27;re just lacking in all departments it seems.