Combichristoffersen
Combovers don't work when there is no hair
ULTROS! said:My iTouch's battery life is dying quickly.
Suck Fony.
Hitler started WWII.
Yuck Fons.
ULTROS! said:My iTouch's battery life is dying quickly.
Suck Fony.
It really depends on how Sony designed their credit card processing system.UberTag said:Hey Blimblim, any chance you can elaborate further on the above point?
While it's been stated that existing CC data was being stored in encrypted fashion (and I fully believe that's the case), when does that encryption process take place? Does it happen immediately upon the PI being associated to the customer's account via the console, PSP, PSN/Qriocity website? Or does that process happen further down the road? Furthermore, what rationale would there have been from a cost effectiveness standpoint for Sony to not have encrypted other customer information in their database?
I've been trying to wrap my head around a scenario where the hackers "may have had access to credit card information" yet did not have access to decryption keys. Understanding whether or not unencrypted credit card details could have been accessed if transactions took place from April 17-19 when the network was compromised would shed some light on the situation.
Blimblim said:It really depends on how Sony designed their credit card processing system.
If they did it the sane way, the credit card processing (and storing) is done on a separate network and the PSN server themselves only store the id of the card as it was stored on that separate server. That way only (highly restricted) people who have access to the payment network can get the actual CC numbers. This is the type of network that should allow for NO outside AT ALL (except for the actual webservice of course), if there is an issue on such network, you go there and connect to the servers locally.
My jukebox is broken.Combichristoffersen said:Hitler started WWII.
Yuck Fons.
Professor Beef said:My jukebox is broken.
uck Fonsy.
UberTag said:Hey Blimblim, any chance you can elaborate further on the above point?
While it's been stated that existing CC data was being stored in encrypted fashion (and I fully believe that's the case), when does that encryption process take place? Does it happen immediately upon the PI being associated to the customer's account via the console, PSP, PSN/Qriocity website? Or does that process happen further down the road? Furthermore, what rationale would there have been from a cost effectiveness standpoint for Sony to not have encrypted other customer information in their database?
I've been trying to wrap my head around a scenario where the hackers "may have had access to credit card information" yet did not have access to decryption keys. Understanding whether or not unencrypted credit card details could have been accessed if transactions took place from April 17-19 when the network was compromised would shed some light on the situation.
BocoDragon said:Fuck Sony.
Fuck Sony.
Professor Beef said:My jukebox is broken.
uck Fonsy.
I wish I knew your roommate.DoctorButt said:my roommate just walked out of the bathroom with an arm full of bacon
jgb g5 6ng.
No, he's pretty much spot on. As for the chat log, it's legit. It's from #ps3dev on efnet.cjtiger300 said:The amount of misinformation in this post is insane. By the way, do you want friend code? I guess thats one way not to lose any info.
The servers at my work are about 45 km away from our main office. It helps making sure every single thing (including the network cables themselves) is redundantjim-jam bongs said:I do so love visits to the server room. They're like IT picnics.
Being from there of course doesn't make it automatically legit, but even if it was, the CC encryption portion of that chat has nothing to with the situation at hand. It was saying that the CC info you submit from your console is not being encrypted before it was sent over HTTPS (which still doesn't make it unsafe, as it just means it was single instead of double encrypted), so he was saying that if you install a CFW made by someone malicious, they could easily put some code in there that would transmit your CC info to them as plaintext, over regular HTTP. basically, a problem only if you install some shady CFW, and nothing to do with this.x3sphere said:No, he's pretty much spot on. As for the chat log, it's legit. It's from #ps3dev on efnet.
Depending on the level of access to hacker did get on the PSN servers, he could very well have put a logger inside the webservices the PS3 uses to send the CC numbers. That's a common way to intercept CC numbers when they can't be extracted directly from a database when a host a compromised.Lord Error said:Being from there of course doesn't make it automatically legit, but even if it was, the CC encryption portion of that chat has nothing to with the situation at hand. It was saying that the CC info you submit from your console is not being encrypted before it was sent over HTTPS (which still doesn't make it unsafe, as it just means it was single instead of double encrypted), so he was saying that if you install a CFW made by someone malicious, they could easily put some code in there that would transmit your CC info to them as plaintext, over regular HTTP. basically, a problem only if you install some shady CFW, and nothing to do with this.
Rocky_Balboa said:This morning I got a phishing email to my email, that I used with PSN. I have never before gotten anything like this on there and only a handful of spam mails, so I'm thinking that this is because of the leak. Unless it's legit. It is supposedly from Yahoo and delicious bookmarks. I have never used either of them. Also the sending address is yahoo@yahoo-email.com.
Maybe I'm paranoid.
I got that email too.Withnail said:FWIW I also received a similar email (from the same yahoo-email.com address) this morning and it looks fine to me. The links in the mail lead to the real delicious site so I don't think it's a phishing scam.
I have used delicious in the past though. It's a bit strange that you have received it if you have never used delicious or Yahoo.
I got one for my US account that has no real information attached, but not for my UK, JP, HK, or my main Australia one.BeeDog said:Still haven't gotten a Sony mail. Feels like my PSN account is completely overlooked, or even borked.
DoctorButt said:My dog just pooped in my sink and I have to clean it up
Fuck Sony.
Yeah it looks very legit. The fact that I haven't used delicious of Yahoo and the timing made me suspicious. Paranoid indeed.Withnail said:FWIW I also received a similar email (from the same yahoo-email.com address) this morning and it looks fine to me. The links in the mail lead to the real delicious site so I don't think it's a phishing scam.
I have used delicious in the past though. It's a bit strange that you have received it if you have never used delicious or Yahoo.
Diablos said:If that log is legit... um, wow.
Wasting all that time and money on attacking Geohot proved futile. They should've doubled down knowing their plastic network was at that point in serious risk and put the safety of their users first. Sony is really blowing my mind in how arrogant, unprofessional and utterly incompetent they have been lately.
MalboroRed said:Litigation and network security are completely separate things, they can sue geohotz AND work on their network without having to choose one over the other.
Ok...so they collect data about the games you play and the devices you connect to the PS3. Big deal. Collecting Data about the games you play = trophies anyways...how else would they be able to display the data to you?koji said:Has that IRC chatlog been posted here already?
Check it. Not sure if it's legit, some juicy stuff in there.
That way could take months to get any large fraction of the userbase data - it certainly wouldn't be any relevant portion in 2 days.Blimblim said:That's a common way to intercept CC numbers when they can't be extracted directly from a database when a host a compromised.
Bu bu but then Sony knows the insane number of hours I've played Hannah Montana? FUUUUUUUmr_nothin said:Ok...so they collect data about the games you play and the devices you connect to the PS3. Big deal. Collecting Data about the games you play = trophies anyways...how else would they be able to display the data to you?
Funny how they call Sony "spies". It's like they live in this other world were everybody is out to get them.
Moving forward, we are initiating several measures that will significantly enhance all aspects of PlayStation Networks security and your personal data, including moving our network infrastructure and data center to a new, more secure location, which is already underway. We will provide additional information on these measures shortly.
Combichristoffersen said:Still no mail for me At least there haven't been any fraudulent charges from my (now cancelled) Visa debit card.
Mount Vesuvius erupted and destroyed Pompeii.
Fuck Sony.
cjtiger300 said:Why are people using this as a credible source? The Credit Card info was encrypted.
You can't encrypt on the client when it's a SSL transaction done with a web browser (well technically you could do it with JS, but there is no point in doing that), which is about 99% of the CC transactions you'll ever see over the internet. So no, it's not a problem under normal circumstances.Vagabundo said:The credit card information - from tat chat log - is sent in plain text over the SSL channel (which itself is encrypted). The poster comments that this not usually sufficient and that the CC info is usually encrypted on the client and then sent over SSL. This has nothing to do with how the CC info may have been stored on the PSN servers.
Vagabundo said:The credit card information - from tat chat log - is sent in plain text over the SSL channel (which itself is encrypted). The poster comments that this not usually sufficient and that the CC info is usually encrypted on the client and then sent over SSL. This has nothing to do with how the CC info may have been stored on the PSN servers.
Vagabundo said:The credit card information - from tat chat log - is sent in plain text over the SSL channel (which itself is encrypted). The poster comments that this not usually sufficient and that the CC info is usually encrypted on the client and then sent over SSL. This has nothing to do with how the CC info may have been stored on the PSN servers.
Vagabundo said:The credit card information - from tat chat log - is sent in plain text over the SSL channel (which itself is encrypted). The poster comments that this not usually sufficient and that the CC info is usually encrypted on the client and then sent over SSL. This has nothing to do with how the CC info may have been stored on the PSN servers.
gofreak said:Uhh...does anyone get a whiff of 'inside job' from that? That sounds like they mean a physically more secure location.
But maybe I'm wrong...
Vagabundo said:The credit card information - from tat chat log - is sent in plain text over the SSL channel (which itself is encrypted). The poster comments that this not usually sufficient and that the CC info is usually encrypted on the client and then sent over SSL. This has nothing to do with how the CC info may have been stored on the PSN servers.