'Impossible-to-hack' security turns out to be no security
CEO Response and Public Relations
- Many commenters see the CEO’s reply to the researcher as hostile, clueless, and self‑sabotaging, especially given the “impossible-to-hack” marketing.
- Several argue the CEO should have thanked the researcher, taken the issue offline, and asked for time to investigate and notify regulators/customers.
- Others speculate the CEO may have been misinformed or had the issue downplayed internally, but note this doesn’t justify threats or denial.
Security Practices and Legacy Systems
- Storing passwords in plaintext is widely condemned, but one thread highlights how legacy, brittle systems, niche databases, and lack of budget/personnel can make remediation “not a near-term option.”
- This sparks an ethical debate: prioritizing revenue and payroll over fixing known security flaws is framed by some as “sub-criminal negligence”; others say they’re trapped by economic realities and aging codebases.
Legality and Ethics of Accessing Exposed Data
- Some warn that even accessing unprotected data can be treated as “hacking” under US law, citing past prosecutions and political grandstanding.
- Others counter that simply viewing publicly served data should not be criminal, but acknowledge the practical risk of being dragged into expensive legal trouble regardless.
Responsible Disclosure vs. Perceived Blackmail
- One camp sees the researcher’s follow-up (“I will publish; are you notifying regulators/customers?”) as standard responsible disclosure and courtesy, not blackmail.
- Another camp says smaller companies without security programs may interpret any “I’m going to publish” notice as extortionary, especially when the researcher has a blog/consulting presence.
Tone, Professionalism, and “Naming and Shaming”
- The article’s sarcastic, confrontational tone divides opinion:
- Supporters say politeness was tried twice, the CEO responded with accusations and threats, and public shaming is justified and necessary to drive accountability.
- Critics label the tone “toxic,” “trollish,” or unprofessional, arguing it undermines the message and makes collaboration harder.
- Multiple people emphasize that researchers have no formal obligation to be “professional,” but professionalism can increase the chance of constructive outcomes.
Chronology and Data Use
- Some confusion arises over when the researcher accessed which data; the researcher clarifies that all database queries were done while the database was exposed, and later file access used URLs obtained earlier.