Soldato
- Joined
- 22 Feb 2010
- Posts
- 5,280
- Location
- Southampton
Have you ever seen a current employee's linkedin?
It's undisclosed at undisclosed..
i promise you at least one person will have lol
Have you ever seen a current employee's linkedin?
It's undisclosed at undisclosed..
If you're that bothered perhaps drop a polite mail to CESG - I doubt some HR chick at GCHQ is going to give a ****
While your website itself might draw attention to the issue if you were still a candidate then I'd have assumed that attempting to show off as a result of finding something trivial isn't really emphasising a good trait as far as this type of employer is concerned.
Unfortunately that was the only email i could really find,
Certainly not trying to show off, just highlight these issues.
Would call it more than trivial, and they did have 2 months to rectify it.
Unfortunately that was the only email i could really find, but i did mention to pass it on to somebody in tech support.
Certainly not trying to show off, just highlight these issues.
Either way as long as it gets fixed, and more people are aware this is bad practice ill be a happy man.
So come on then, what's the potential security threat and implications of your account password being exposed.
When the top security guys in the UK apply for a job there, and get their password sent back to them in plain text, what do you think their impression will be?
Why create a website then? I mean if you thought it was genuinely a serious security failure on their part then broadcasting it is a good idea because....?
Have a read of Troy Hunt's blog as he writes some nice articles around this sort of thing if you're interested, his rant at Tesco was rather amusing.
I think the morally correct thing to do when you find a security flaw with a system is to let the company in question know about it and give them time to fix it, then if they don't, go public so they are shamed into fixing it and people know not to give their details to that company, and that's exactly what he did. I guess you have a different view on how to handle a situation like this though.
Its not really what he did though is it... I mean it wouldn't have taken much of his time to find a more appropriate person to write a sensible e-mail to than someone working in HR.
As for going public - given who we're talking about here - if he genuinely believed he had discovered a serious security flaw then can you not see how it might be a bit silly to highlight it publicly... not really exercising great judgement.
The whole exercise of creating a webpage to highlight some mundane flaw like this comes across as just a big *look at me* exercise. I think overall its probably better that the OP isn't working for them.
True, he could have persisted and tried to find someone else to report it to, but I personally don't think he was obliged to.
As for going public, it can easily be argued either way that it was good and bad for security. Obviously you're looking at it in terms of making it public paints a target for people try to hit, which of course it does, so I think your reasoning is perfectly valid.
However, I would argue that making it public after they've refused to fix it is good for security if embarrassment or public pressure forces them to fix it, and in this case, they're guilty of bad practice that anyone can see anyway, rather than a bug that only someone trying to hack the site would find.
I'm sure it's an external recruitment company in which passwords being stored in plaintext is quite common with what I've experienced.
Its not really what he did though is it... I mean it wouldn't have taken much of his time to find a more appropriate person to write a sensible e-mail to than someone working in HR.
The whole exercise of creating a webpage to highlight some mundane flaw like this comes across as just a big *look at me* exercise. I think overall its probably better that the OP isn't working for them.
Can you find an email of somebody more appropriate? Because i couldn't. Funnily enough they don't seem keen on incoming emails.
It's more of a look at them exercise actually, pretty standard thing when it comes to security flaws that don't get fixed after being made aware.
It's clearly educated at least a few people here, which will hopefully make for more secure websites in the future, which is surely a good thing!
That isn't actually on GCHQ site AFAIK.