• pivot_root@lemmy.world
    link
    fedilink
    English
    arrow-up
    55
    ·
    1 month ago

    Tea was storing its users’ sensitive information on Firebase, a Google-owned backend cloud storage and computing service.

    Every time. With startups, it’s always an unsecured Firebase or S3 bucket.

    • NeilBrü@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      edit-2
      1 month ago

      I’m certainly no web security expert, but shouldn’t Tea’s junior network/backend/security developers, let alone seniors, know how to secure said Firebase or S3 buckets with STARTTLS or SSL certificates? Shouldn’t a company like this have some sort of compliance department?

      • GissaMittJobb@lemmy.ml
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 month ago

        SSL is not the tool you need in this case, although you should obviously already be running exclusively on encrypted traffic.

        The problem here is one of access rights - you should not make files default-available for anyone that can figure out the file name to the particular file in the bucket. At the very least, you need to be using signed URLs with a reasonably short expiration, and default all other access to be blocked.

        • NeilBrü@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 month ago

          As I mentioned in other comments, I am a noob when it comes to web-sec; please forgive what may be dumb questions.

          Is it really just permission rights “over-exposure” issue? Or does one need to also encrypt and then decrypt the data itself that must be sent to a database?

          Also, if you have time, recommend any links to web/cloud/SaaS security best practices “for dummies”?

    • betterdeadthanreddit@lemmy.world
      link
      fedilink
      English
      arrow-up
      57
      arrow-down
      1
      ·
      1 month ago

      You sign up and then a while later, your personal information gets leaked to the public. Not sure what its other purpose is.

      • ORbituary@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        19
        arrow-down
        1
        ·
        1 month ago

        That’s corporate social media/apps in general. Does this thing basically let people list crappy things that happened to them by specific humans?

  • atk007@lemmy.world
    link
    fedilink
    English
    arrow-up
    4
    ·
    1 month ago

    Why did the app had the government IDs and credit card data to begin with? The app looks like an obvious phishing scam/ Honeypot situation.

    • GreenKnight23@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      1 month ago

      that’s a great(terrible) idea for a sex trafficking psyop. just get yourself a female spokesperson and make it a platform that gives a voice to women who have survived abuse. they’ll willingly give you all their information on where to find them and their psych profiles on how to manipulate them.

      fucked up, but really shows how fucked up apps are in general and how much power we give to them over ourselves.