Meta fined $102M for storing passwords in plain text
GDPR, fines, and what counts as a “breach”
- Incident stems from passwords stored in readable form since 2012, discovered and handled around 2019, after GDPR came into force.
- Fine is for multiple GDPR violations: inadequate technical measures, and failing to notify and document the breach promptly.
- Some think €102M is low vs the theoretical 4% of global turnover; others note regulators rarely use the maximum and factor in self‑reporting and perceived impact.
- Strong debate over whether this is a “breach” or just a “control failure”:
- One side: internal access to plaintext passwords is inherently a personal data breach under GDPR’s broad definition and creates a “reasonable expectation” of misuse.
- Other side: without evidence of unauthorized use or harm, calling it a breach is overreach and weakens GDPR’s credibility.
Nature and severity of Meta’s failure
- Many highlight that passwords were likely logged accidentally (e.g., debugging, middleware, crash dumps) rather than intentionally stored unhashed.
- Others argue “no intent” is irrelevant; if someone noticed and cleanup was deferred, it effectively became intentional.
- Concern over impact beyond Meta accounts due to widespread password reuse (e.g., employees or insiders accessing users’ other services).
How large organizations end up here
- Descriptions of big‑org realities: legacy systems, unclear ownership, massive logs never reviewed, over‑permissive access (“just give them everything so work gets done”).
- Some blame culture and management: security tickets deprioritized, focus on closing tickets vs fixing root causes, “compliance theater” over true security.
- Counterpoint: it’s still negligent to accept known dangerous patterns (e.g., unsecured core dumps, plaintext logs) just because systems are complex.
Developer competence, hiring, and security culture
- Multiple commenters say many developers don’t understand basic security (password handling, PII in logs, PCI/PII rules), and managers don’t incentivize learning.
- Others argue competent engineers should know relevant regulations; security questions should be part of hiring, especially for sensitive systems.
- Recurrent theme: logging middlewares and support channels (email, chat, phone) are common, underestimated vectors for leaking secrets.
Views on EU regulation and incentives
- Some see GDPR fines as necessary to create real incentives, since otherwise companies “don’t care.”
- Others view GDPR as burdensome “import tariff” or legal minefield that pushes smaller sites to block EU users.
- Disagreement over how “big” and indispensable the EU market is, but consensus that large tech firms will generally comply rather than exit.