TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

The Facts about LinkedIn Intro

57 点作者 rahulvohra超过 11 年前

26 条评论

tptacek超过 11 年前
Cory Scott was a director at Matasano, ran our west coast office, and is as trustworthy an appsec person as I know.<p>Cory also postdates LinkedIn&#x27;s security drama; he was brought in after the credential leak, which was a good call on LinkedIn&#x27;s part and sort of a brave move on Cory&#x27;s part.<p>(And, full disclosure: iSEC is one of Matasano&#x27;s sister companies; take this for whatever its worth, but their reputation is excellent).<p>I would tend to believe anything he says about this or any other LinkedIn system he&#x27;s worked on.<p>That said, I would still under no circumstances give LinkedIn access to my mail spool, <i>or any other third party</i>.<p>I&#x27;m also a little queasy about the idea of &quot;norming&quot; these kinds of systems. Look at how much work LinkedIn put into securing Intro, and ask whether any startup will have the means to do the same. I doubt it.
评论 #6619053 未加载
评论 #6619187 未加载
评论 #6620138 未加载
评论 #6619128 未加载
评论 #6619470 未加载
wellboy超过 11 年前
Why do the billion dollar companies just not get that people can see through double speak now.<p>Let´s look at the double speak here, which intends to give a statement weight even though it has zero weight. On the left side original statement with zero weight, after the slash how the statement would have weight<p>1. We isolated Intro in a separate network segment and implemented a tight security perimeter across trust boundaries.&#x2F; Doesn&#x27;t say anything at all again<p>2. REDUCED exposure to third-party monitoring services and tracking&#x2F;PREVENT exposure to third-party monitoring services and tracking<p>3. We also had iSEC Partners, a well-respected security consultancy, perform a line-by-line code review of the credential handling and mail parsing&#x2F;insertion code.&#x2F; That statement isn&#x27;t saying anything at all<p>4. make sure identified vulnerabilities WERE ADDRESSED&#x2F; make sure there are NO vulnerabilities<p>5. we make sure we NEVER persist the mail contents to our systems in an unencrypted form. And once the user has retrieved the mail, the encrypted content is DELETED from our systems.&#x2F; These two words have weight.<p>6. MINIMIZE exposure&#x2F;REMOVE exposure<p>7. We WORKED TO HELP ENSURE&#x2F; We ENSURE<p>Overall, Linked avoids using terminology that is actually a commitment except for 5. Fortunately, people picked up on double speak and Linkedin has managed to corrupt trust with its users further.<p>Somebody should fire the person that think sthis kind of &quot;clarification&quot; gets back their user&#x27;s trust.
评论 #6619266 未加载
评论 #6619112 未加载
mbesto超过 11 年前
&gt; <i>This blog post is intended to provide more information and address inaccurate assertions </i><p>I don&#x27;t like this part of the full statement. It doesn&#x27;t specifically address what assertions are incorrect and which are correct. Systems are and never will be 100% secure. No matter how much technology you throw at something, there is always going to be a balance between accessibility and security.<p>I do believe LinkedIn has a done a massive amount of due diligence (much more so than many other organizations would care to do) which is great and I&#x27;m glad they took the time to respond. <i>However</i>, correct me if I&#x27;m wrong, but there is an underlying assumption from the general populace that if a security expert says something is secure than this means this <i>never</i> can get hacked. Which I would respond - not true.
onedev超过 11 年前
&gt;&quot;We isolated Intro in a separate network segment and implemented a tight security perimeter across trust boundaries.&quot;<p>&gt;&quot;We performed hardening of the externally and internally-facing services and reduced exposure to third-party monitoring services and tracking.&quot;<p>What do those points even mean? They&#x27;re written like the marketing department wrote them and fluffed them to the max. &quot;Performed hardening&quot;....really? It just sounds like they don&#x27;t know what they&#x27;re talking about. &quot;Oh yeah we totally isolated and secured the perimeter, the app is good now&quot;. If my dad heard that he&#x27;d think &quot;Oh like in those war movies where they secure the perimeter? Awesome!&quot;. A lot of the other points they listed are like this too, I just picked out the first couple.
offbyone超过 11 年前
That article misses the key point; a MITM proxy for mail is the actual problem, no matter how well implemented it is.
评论 #6619003 未加载
评论 #6619368 未加载
评论 #6619073 未加载
st3fan超过 11 年前
&quot;When the LinkedIn Security team was presented with the core design of Intro, we made sure we built the most secure implementation we believed possible.&quot;<p>I think that is the problem. The security team should have said: &quot;Stop. This is an insanely stupid idea. No matter how we implement it, let&#x27;s just not do this.&quot;<p>Instead they tried to make the best of it.<p>I feel sorry for those folks. I bet in their heart they all know it is an utterly stupidly designed product that should never have seen the light of day.
评论 #6619279 未加载
评论 #6619556 未加载
jamescun超过 11 年前
The issue wasn&#x27;t with their implementation, it was with sending all our emails through a single company, and a company whose policies border on spam at that.
3825超过 11 年前
Let&#x27;s take a step back at what value LinkedIn Intro is supposed to give to me. What would be a better way to deliver this value?<p>I&#x27;d argue the best way to deliver this would be by working with mail providers not by subverting them. LinkedIn could open itself up and allow people to query names and profile information (probably would have to be opt-in) given an email address. A client would just send information an email address, and LinkedIn would hand back name and (public) profile information. If the client chooses to send their own email address, LinkedIn could send back a richer set of information including connections. The email client would then display the information in a way that it knows best.<p>The whole idea is so simple and straightforward that I cannot help but think LinkedIn&#x27;s ultimate goal is not to just know who is sending emails to whom but also what they are saying. Cory Scott may know that the implementation is solid but I doubt he knows the motivations of his corporate overlords.<p>Perhaps LinkedIn should put a badge on all profiles of members who have opted in to the Intro service so I can cut all ties with them.
richbradshaw超过 11 年前
I don&#x27;t think much of this was the issue – the issue was &quot;do you trust LinkedIn with something so vital to your identity&quot;. I think it was assumed that the feature would be implemented technically competently.
nostromo超过 11 年前
After the previous discussion, I kept wondering why I didn&#x27;t trust LinkedIn with my email, but did trust Google.<p>Google is actually much more terrifying in that they have more information about me than any other entity (Search, Gmail, Google Analytics, Chrome, GChat, etc.) Yet, I tend not to give it much thought.<p>Some people are upset about LinkedIn spam - but that&#x27;s never been a problem for me. I haven&#x27;t figured out a good answer to this yet.
评论 #6619269 未加载
评论 #6619104 未加载
pinaceae超过 11 年前
By now this is a complete clusterfuck.<p>The core idea behind this &quot;service&quot; of injecting LI info into any mail is broken. No security theater around it will change that.<p>LI should have worked with Apple to come up with a way to embed this kind of info natively into the mail app. And if that is not possible, add an email inbox to their LI app, so that the email header would be post-processed within the app. Make people use LI as their mail client (who knows, maybe someone would have liked this).<p>But injecting crap into the normal iOS mail app? What a strange approach.
colinbartlett超过 11 年前
Is linking to their privacy policy supposed to be comforting in some way?<p>&quot;We promise that the only thing we do with your data is what we said we do inside this huge legal document.&quot;
评论 #6618993 未加载
alex_young超过 11 年前
What worries me here is not trusting a third party with mail - we all already do that, this is the nature of SMTP.<p>The issue is that LinkedIn wants to provide mail services without saying it&#x27;s your mail provider.<p>If you want to be a mail host, be a mail host. Don&#x27;t half ass it by pretending you&#x27;re offering a value added service to someone else&#x27;s MX.<p>Convince me there&#x27;s a reason to use your mail service. Show me there&#x27;s a reason to trust you. I evaluate it and decide if I want to switch. This process works. It&#x27;s proven. We expect things out of MXs.<p>No one knows how to evaluate an MX proxy on a consumer basis. There&#x27;s no reason to change this. I don&#x27;t care if you&#x27;re LinkedIn or anyone else.<p>This smacks of shortcut taking. Don&#x27;t trust them.
10char超过 11 年前
An advantageous move for LinkedIn might be to just launch it&#x27;s own email service and compete with Gmail. So many add-ons and hacks exist to add LinkedIn capabilities to existing email, it might be worth it on their part to do it the Right Way.
ceocoder超过 11 年前
After reading original announcement and this follow up post, and comments here. I find my self looking at it in a binary scenario - do they think they did a better job securing intro after the account breach - possibly, is the risk of letting one MORE entity (in addition to gmail with recent developments in mind) read thru your mails for marginal - at least for me - gain worth it? A solid NO.
fooshero85超过 11 年前
Bishop Fox is a glorified gossip queen of a security company. What type of engineers, or so called hackers just make stupidly false claims without actually knowing what is going on behind the scenes. This is the software industry, not the Kim Kardashian, Honey Boo boo entertainment industry folks... Get the facts straight, or get a new job.
评论 #6619240 未加载
philjackson超过 11 年前
I think this is the most interesting documentation considering the debates I&#x27;ve seen here on HN: <a href="https://intro.linkedin.com/micro/privacy" rel="nofollow">https:&#x2F;&#x2F;intro.linkedin.com&#x2F;micro&#x2F;privacy</a>
aheilbut超过 11 年前
I&#x27;d feel better if LinkedIn would be more transparent about the data they have collected on my network and how they make predictions, and would allow me to delete such information if I wish, because I find some of their &quot;People you may know&quot; recommendations to be decidedly creepy.<p>Even assuming that they are technically able to do this securely, it&#x27;s the opacity about how they will use the data and how long they&#x27;ll keep it that bothers me.
pbreit超过 11 年前
I hate the way LinkedIn handles criticism. Most of the discussion I&#x27;ve seen has centered on the concept, not the implementation. Instead of trying to allay concerns about the concept, LinkedIn spends the whole, defensive post chiding commentators for &quot;inaccuracies and misperceptions&quot; and proceeds to humblebrag about how thorough its security precautions were.
quink超过 11 年前
Why not talk to Apple or Google and make this a reality in some other way?<p>Surely it can&#x27;t be hard for a company like LinkedIn, about as important as Facebook, to ask Apple or Google to provide some way of hooking into a third party application or well documented API?<p>It might take longer and be a bit more complicated but it must be a better way to go about this than MITM.
评论 #6619089 未加载
msh超过 11 年前
Well considering their password incompetence i would not trust them with any sensitive information for a long long time.
alkonaut超过 11 年前
THEY host the intro proxy? Wouldn&#x27;t it be better if each individual or organization had their own intro proxy that provided this? I.e. mail client-&gt; my proxy -&gt; (linkedIn + mailServer)?
wai1234超过 11 年前
Perhaps next we will hear from a bank robber that he will take very good care of our money.
dmak超过 11 年前
Unsalted passwords.
eball超过 11 年前
Read a comment the other day wondering about what if two(or more) programs did this. Would you end up with a chain of proxies between you and the mail server?<p>From the excellent Old New Thing blog: <a href="http://blogs.msdn.com/b/oldnewthing/archive/2005/06/07/426294.aspx" rel="nofollow">http:&#x2F;&#x2F;blogs.msdn.com&#x2F;b&#x2F;oldnewthing&#x2F;archive&#x2F;2005&#x2F;06&#x2F;07&#x2F;42629...</a>
评论 #6619087 未加载
fooshero85超过 11 年前
<a href="http://www.bishopfox.com/" rel="nofollow">http:&#x2F;&#x2F;www.bishopfox.com&#x2F;</a><p>&quot;Error establishing a database connection&quot;<p>Can&#x27;t even keep a website up and running, what a very tech savvy company.