Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "passwords security"
-
Long but worth it...
So I was cleaning out my Google Drive last night, and deleted some old (2 years and up) files. I also deleted my old work folder, it was for an ISP I worked for over 2 years ago. After deleting the files I had a little twinge of "Man I hope they're not still using those". But seriously, it'd be a pretty big security risk if I was still the owner of those files... right? Surely they copied them and deleted all the info from the originals. IP addresses, Cisco configs, username and passwords for various devices, pretty much everything but customer info.
Guess who I get a call from this morning... "Hi this is Debbie from 'ISP'. I was trying to access the IP Master List and I can't anymore. I was just told to call you and see if there's any way to get access to it again" (Not her real name...)
I had to put her on hold so I could almost die of laughter...
Me: "Sorry about that Debbie, I haven't worked for that company for over 2 years. Your telling me in all that time no one thought to save them locally? No one made a copy? I still had the original documents?!"
Long pause
D: "Uh... Apparently not..."
Another long pause
D: "So is there any way you can give me access to them again?"
Me: "They're gone Debbie. I deleted them all last night."
D: Very worried voice "Can... Can you check?"
This kids is why you never assume you'll always have access to a cloud stored file, make local copies!!
A little bit of background on this company, the owner's wife fired me on trumped up "time card discrepancy" issues so she could hire her freshly graduated business major son. The environment over there was pretty toxic anyway...
I feel bad for "Debbie" and the other staff there, it's going to be a very bad week for them. I also hope it doesn't impact any customers. But... It is funny as hell, especially since I warned the owner as I was clearing out my desk to save copies, and plan on them being gone soon. Apparently he never listened.
This is why you should have a plan in place... And not just wing it...
PS. First Post!25 -
Me Visiting a new location...
*Device found a new wi-fi signal:
worldsMostSecureRouter
*Enter password:
worldsMostSecureRouter123
*Authorizing...
*Obtaining IP address
*Connected2 -
Me: how's your password security?
Them: of course we value security very highly, our passwords are all hashed before being stored.
Me: what hashing algorithm?
Them: oh we hash it with sha and then place that in a table indexed by the password.
Indexed. By. The fucking. Password.16 -
Happened a few weeks ago but still awesome.
Me and a good friend have a website together but we don't monitor it too much.
He studied with me in the same class but went towards frontend/apps where I chose backend/servers/security. He knows how to do basic Linux stuff but that's about it.
We were at a party when he noticed that our site was offline. Walked over to me (because I manage the server) to notify me so I could look into it said I'd look into it (phone):
*visits site: nothing*
*online dig tool: got the server ip*
*remembered this one didn't have pubkey authentication - after three passwords attempts I'm in*
"service apache2 status"
*service doesn't exist*
*right, migrated this one from Apache to nginx....*
"history"
*ah, an nginx restart probably suffices...*
"service nginx restart"
BAM, site is reachable again.
*god damnit, lets encrypt cert expired...*
"history"
*sees command with certbot and our domain both in one*
"!892"
*20 seconds later: success message*
*service nginx reload*
BAM, site works securely again.
"Yo mate, check the site again"
Mate: 😶 w-w-what? *checks site and his watch* you started less than two minutes ago...?
Me: yeah..?
Mate: 😶 now this is why YOU manage our server and I don't 😐
His face was fucking gold. It wasn't that difficult for me (I do this daily) but to him, I was a God at that moment.
Awesome moment 😊23 -
Hacking/attack experiences...
I'm, for obvious reasons, only going to talk about the attacks I went through and the *legal* ones I did 😅 😜
Let's first get some things clear/funny facts:
I've been doing offensive security since I was 14-15. Defensive since the age of 16-17. I'm getting close to 23 now, for the record.
First system ever hacked (metasploit exploit): Windows XP.
(To be clear, at home through a pentesting environment, all legal)
Easiest system ever hacked: Windows XP yet again.
Time it took me to crack/hack into today's OS's (remote + local exploits, don't remember which ones I used by the way):
Windows: XP - five seconds (damn, those metasploit exploits are powerful)
Windows Vista: Few minutes.
Windows 7: Few minutes.
Windows 10: Few minutes.
OSX (in general): 1 Hour (finding a good exploit took some time, got to root level easily aftewards. No, I do not remember how/what exactly, it's years and years ago)
Linux (Ubuntu): A month approx. Ended up using a Java applet through Firefox when that was still a thing. Literally had to click it manually xD
Linux: (RHEL based systems): Still not exploited, SELinux is powerful, motherfucker.
Keep in mind that I had a great pentesting setup back then 😊. I don't have nor do that anymore since I love defensive security more nowadays and simply don't have the time anymore.
Dealing with attacks and getting hacked.
Keep in mind that I manage around 20 servers (including vps's and dedi's) so I get the usual amount of ssh brute force attacks (thanks for keeping me safe, CSF!) which is about 40-50K every hour. Those ip's automatically get blocked after three failed attempts within 5 minutes. No root login allowed + rsa key login with freaking strong passwords/passphrases.
linu.xxx/much-security.nl - All kinds of attacks, application attacks, brute force, DDoS sometimes but that is also mostly mitigated at provider level, to name a few. So, except for my own tests and a few ddos's on both those domains, nothing really threatening. (as in, nothing seems to have fucked anything up yet)
How did I discover that two of my servers were hacked through brute forcers while no brute force protection was in place yet? installed a barebones ubuntu server onto both. They only come with system-default applications. Tried installing Nginx next day, port 80 was already in use. I always run 'pidof apache2' to make sure it isn't running and thought I'd run that for fun while I knew I didn't install it and it didn't come with the distro. It was actually running. Checked the auth logs and saw succesful root logins - fuck me - reinstalled the servers and installed Fail2Ban. It bans any ip address which had three failed ssh logins within 5 minutes:
Enabled Fail2Ban -> checked iptables (iptables -L) literally two seconds later: 100+ banned ip addresses - holy fuck, no wonder I got hacked!
One other kind/type of attack I get regularly but if it doesn't get much worse, I'll deal with that :)
Dealing with different kinds of attacks:
Web app attacks: extensively testing everything for security vulns before releasing it into the open.
Network attacks: Nginx rate limiting/CSF rate limiting against SYN DDoS attacks for example.
System attacks: Anti brute force software (Fail2Ban or CSF), anti rootkit software, AppArmor or (which I prefer) SELinux which actually catches quite some web app attacks as well and REGULARLY UPDATING THE SERVERS/SOFTWARE.
So yah, hereby :P39 -
Are you serious? Are you afraid of an SQL injection or something, and instead of properly sanitizing your queries you disallow characters? Or is your software and database so outdated that you're afraid special characters will break it? Goodbye security
15 -
Hope it's not a repost but this is brilliant... although putting it up in my office wouldnt change anything. Password123 was there before me and it'll be there after me.
8 -
"I really love the new $3k Fortigate firewall switch you bought for the office after our chat about security but it doesn't change the fact that you can access any computer in the company using Password123" - me13
-
What the actual fuck? Person (or people!) who devised this password policy, you are an idiot (or idiots - all of you). You are stupid and insane and have no idea about security or user experience.
14 -
So our public transportation company started to sell tickets online with their brand new fancy system.
• You can buy tickets and passes for the price you want
• Passwords are in plaintext
• Communication is through HTTP
• Login state are checked before the password match so you can basically view who is online
• Email password reminders security code can be read from servers response
Oh and I almost forgot admin credentials are FUCKING admin/admin
Who in the fucking name of all gods can commit such idiocracy with a system that would be used by almost millions of people. I hope you will burn in programming hell. Or even worse...
I'm glad I'm having a car and don't have to use that security black hole.15 -
Me: *enters password on phone (long PIN)*
Person next to me is looking at my phone WHILE I enter my password, and as I look at him, he doesn't even turn away and even has the nerve to say:
"Wow, why do you have such a long password!"
Μy answer: "Because of security reasons."
What I actually wanted to say:
"Because of pieces of SHIT like you who can't keep their eyes to themselves, even when PASSWORDS are involved, you FUCK! Guess why everytime I enter a password in public, I have to dim my screen and turn my screen sideways? Because of fuckheads like you, not knowing shit about privacy and security! Fuck you!"7 -
PM: We need security on signup, the password entry should contain "A capital letter, 2 numbers, a symbol, an inspiring message, a spell, a gang sign, a hieroglyph and the blood of a virgin."
ME:
8 -
Navy story continued.
And continuing from the arp poisoning and boredom, I started scanning the network...
So I found plenty of WinXP computers, even some Win2k servers (I shit you not, the year was 201X) I decided to play around with merasploit a bit. I mean, this had to be a secure net, right?
Like hell it was.
Among the select douchebags I arp poisoned was a senior officer that had a VERY high idea for himself, and also believed he was tech-savvy. Now that, is a combination that is the red cloth for assholes like me. But I had to be more careful, as news of the network outage leaked, and rumours of "that guy" went amok, but because the whole sysadmin thing was on the shoulders of one guy, none could track it to me in explicit way. Not that i cared, actually, when I am pissed I act with all the subtleness of an atom bomb on steroids.
So, after some scanning and arp poisoning (changing the source MAC address this time) I said...
"Let's try this common exploit, it supposedly shouldn't work, there have been notifications about it, I've read them." Oh boy, was I in for a treat. 12 meterpreter sessions. FUCKING 12. The academy's online printer had no authentication, so I took the liberty of printing a few pages of ASCII jolly rogers (cute stuff, I know, but I was still in ITSec puberty) and decided to fuck around with the other PCs. One thing I found out is that some professors' PCs had the extreme password of 1234. Serious security, that was. Had I known earlier, I could have skipped a TON of pointless memorising...
Anyway, I was running amok the entire network, the sysad never had a chance on that, and he seemed preoccupied with EVERYTHING ELSE besides monitoring the net, like fixing (replacing) the keyboard for the commander's secretary, so...
BTW, most PCs had antivirus, but SO out of date that I didn't even need to encode the payload or do any other trick. An LDAP server was open, and the hashed admin password was the name of his wife. Go figure.
I looked at a WinXP laptop with a weird name, and fired my trusty ms08_067 on it. Passowrd: "aaw". I seriously thought that Ophcrack was broken, but I confirmed it. WTF? I started looking into the files... nothing too suspicious... wait a min, this guy is supposed to work, why his browser is showing porn?
Looking at the ""Deleted"" files (hah!) I fount a TON of documents with "SECRET" in them. Curious...
Decided to download everything, like the asshole I am, and restart his PC, AND to leave him with another desktop wallpaper and a text message. Thinking that he took the hint, I told the sysadmin about the vulnerable PCs and went to class...
In the middle of the class (I think it was anti-air warfare or anti-submarine warfare) the sysad burst through the door shouting "Stop it, that's the second-in-command's PC!".
Stunned silence. Even the professor (who was an officer). God, that was awkward. So, to make things MORE awkward (like the asshole I am) I burned every document to a DVD and the next day I took the sysad and went to the second-in-command of the academy.
Surprisingly he took the whole thing in quite the easygoing fashion. I half-expected court martial or at least a good yelling, but no. Anyway, after our conversation I cornered the sysad and barraged him with some tons of security holes, needed upgrades and settings etc. I still don't know if he managed to patch everything (I left him a detailed report) because, as I've written before, budget constraints in the military are the stuff of nightmares. Still, after that, oddly, most people wouldn't even talk to me.
God, that was a nice period of my life, not having to pretend to be interested about sports and TV shows. It would be almost like a story from highschool (if our highschool had such things as a network back then - yes, I am old).
Your stories?8 -
Watching the Dutch government trying to get through the public procurement process for a "corona app" is equal parts hilarious and terrifying.
7 large IT firms screaming that they're going to make the perfect app.
Presentations with happy guitar strumming advertisement videos about how everyone will feel healthy, picnicking on green sunny meadows with laughing families, if only their app is installed on every citizen's phone.
Luckily, also plenty of security and privacy experts completely body-bagging these firms.
"It will connect people to fight this disease together" -- "BUT HOW" -- "The magic of Bluetooth. And maybe... machine learning. Oh! And blockchain!" -- "BUT HOW" -- "Shut up give us money, we promise, our app is going to cure the planet"
You got salesmen, promising their app will be ready in 2 weeks, although they can't even show any screenshots yet.
You got politicians mispronouncing technical terminology, trying hard to look as informed as possible.
You got TV presenters polling population support for "The App" by interviewing the most digitally oblivious people.
One of the app development firms (using some blockchain-based crap) promised transparency about their source code for auditing.... so they committed their source, including a backup file from one of their other apps, containing 200 emails/passwords to Github.
It's kind of entertaining... in the same way as a surgery documentary about the removal of glass shards from a sexually adventurous guy's butthole.
Imma keep watching out of morbid fascination.... from a very safe distance, far away from the blood and shit that's splattering against the walls.
And my phone -- keep your filthy infected bytes away from my sweet baby.
I'll stick with social distancing, regular hand washing, working from home and limited supermarket trips, thank you very much.26 -
I wonder why banks are always so terribly insecure, given how much money there's for grabs in there for hackers.
Just a while ago I got a new prepaid credit card from bpost, our local postal service that for some reason also does banking. The reason for that being that - thank you 'Murica! - a lot of websites out there don't accept anything but credit cards and PayPal. Because who in their right mind wouldn't use credit cards, right?! As it turns out, it's pretty much every European I've spoken to so far.
That aside, I got that card, all fine and dandy, it's part of the Mastercard network so at least I can get my purchases from those shitty American sites that don't accept anything else now. Looked into the manual of it because bpost's FAQ isn't very clear about what my login data for their online customer area now actually is. Not that their instruction manual was either.
I noticed in that manual that apparently the PIN code can't be changed (for "security reasons", totally not the alternative that probably they didn't want to implement it), and that requesting a forgotten PIN code can be done with as little as calling them up, and they'll then send the password - not a reset form, the password itself! IN THE FUCKING MAIL.
Because that's apparently how financial institutions manage their passwords. The fact that they know your password means that they're storing it in plain text, probably in a database with all the card numbers and CVC's next to it. Wouldn't that be a treasure trove for cybercriminals, I wonder? But YOU the customer can't change your password, because obviously YOU wouldn't be able to maintain a secure password, yet THEY are obviously the ones with all the security and should be the ones to take out of YOUR hands the responsibility to maintain YOUR OWN password.
Banking logic. I fucking love it.
As for their database.. I reckon that that's probably written in COBOL too. Because why wouldn't you.23 -
Fuck me, big fucking security flaw with a UK internet service provider, my head has gone through my desk and hit the floor it’s that bad.
23 -
Worst thing you've seen another dev do? So many things. Here is one...
Lead web developer had in the root of their web application config.txt (ex. http://OurPublicSite/config.txt) that contained passwords because they felt the web.config was not secure enough. Any/all applications off of the root could access the file to retrieve their credentials (sql server logins, network share passwords, etc)
When I pointed out the security flaw, the developer accused me of 'hacking' the site.
I get called into the vice-president's office which he was 'deeply concerned' about my ethical behavior and if we needed to make any personnel adjustments (grown-up speak for "Do I need to fire you over this?")
Me:"I didn't hack anything. You can navigate directly to the text file using any browser."
Dev: "Directory browsing is denied on the root folder, so you hacked something to get there."
Me: "No, I knew the name of the file so I was able to access it just like any other file."
Dev: "That is only because you have admin permissions. Normal people wouldn't have access"
Me: "I could access it from my home computer"
Dev:"BECAUSE YOU HAVE ADMIN PERMISSIONS!"
Me: "On my personal laptop where I never had to login?"
VP: "What? You mean ...no....please tell me I heard that wrong."
Dev: "No..no...its secure....no one can access that file."
<click..click>
VP: "Hmmm...I can see the system administration password right here. This is unacceptable."
Dev: "Only because your an admin too."
VP: "I'll head home over lunch and try this out on my laptop...oh wait...I left it on...I can remote into it from here"
<click..click..click..click>
VP: "OMG...there it is. That account has access to everything."
<in an almost panic>
Dev: "Only because it's you...you are an admin...that's what I'm trying to say."
Me: "That is not how our public web site works."
VP: "Thank you, but Adam and I need to discuss the next course of action. You two may go."
<Adam is her boss>
Not even 5 minutes later a company wide email was sent from Adam..
"I would like to thank <Dev> for finding and fixing the security flaw that was exposed on our site. She did a great job in securing our customer data and a great asset to our team. If you see <Dev> in the hallway, be sure to give her a big thank you!"
The "fix"? She moved the text file from the root to the bin directory, where technically, the file was no longer publicly visible.
That 'pattern' was used heavily until she was promoted to upper management and the younger webdev bucks (and does) felt storing admin-level passwords was unethical and found more secure ways to authenticate.5 -
Buckle up kids, this one gets saucy.
At work, we have a stress test machine that trests tensile, puncture and breaking strength for different materials used (wood construction). It had a controller software update that was supposed to be installed. I was called into the office because the folks there were unable to install it, they told me the executable just crashed, and wanted me to take a look as I am the most tech-savvy person there.
I go to the computer and open up the firmware download folder. I see a couple folders, some random VBScript file, and Installation.txt. I open the TXT, and find the first round of bullshit.
"Do not run the installer executable directly as it will not work. Run install.vbs instead."
Now, excuse me for a moment, but what kind of dick-cheese-sniffing cockmonger has end users run VBScript files to install something in 2018?! Shame I didn't think of opening it up and examining it for myself to find out what that piece of boiled dogshit did.
I suspend my cringe and run it, and lo and behold, it installs. I open the program and am faced with entering a license key. I'm given the key by the folks at the office, but quickly conclude no ways of entering it work. I reboot the program and there is an autofilled key I didn't notice previously. Whatever, I think, and hit OK.
The program starts fine, and I try with the login they had previously used. Now it doesn't work for some reason. I try it several times to no avail. Then I check the network inspector and notice that when I hit login, no network activity happens in the program, so I conclude the check must be local against some database.
I browse to the program installation directory for clues. Then I see a folder called "Databases".
"This can't be this easy", I think to myself, expecting to find some kind of JSON or something inside that I can crawl for clues. I open the folder and find something much worse. Oh, so much worse.
I find <SOFTWARE NAME>.accdb in the folder. At this point cold sweat is already running down my back at the sheer thought of using Microsoft Access for any program, but curiosity takes over and I open it anyway.
I find the database for the entire program inside. I also notice at this point that I have read/write access to the database, another thing that sent my alarm bells ringing like St. Pauls cathedral. Then I notice a table called "tUser" in the left panel.
Fearing the worst, I click over and find... And you knew it was coming...
Usernames and passwords in plain text.
Not only that, they're all in the format "admin - admin", "user - user", "tester - tester".
I suspend my will to die, login to the program and re-add the account they used previously. I leave the office and inform the peeps that the program works as intended again.
I wish I was making this shit up, but I really am not. What is the fucking point of having a login system at all when your users can just open the database with a program that nowadays comes bundled with every Windows install and easily read the logins? It's not even like the data structure is confusing like minified JSON or something, it's literally a spreadsheet in a program that a trained monkey could read.
God bless them and Satan condemn the developers of this fuckawful program.8 -
Boss hands over to me an old security audit report and tells me "Go through this and check if all the problems mentioned have been resolved". Quick glance through the report shows all expected issues - SQLi, plaintext transmission and storage etc. I tell him that I need access to the application both from admin and a user with restricted privileges.
He hands me the admin credentials and tells me, "After you login in, just go the "Users" tab. You'll find the profiles of all the users there. You can get the emails and passwords of any user you want from there."
I had to hold back a chuckle. There's nothing to verify. If they haven't resolved storing plain text passwords in the database (AND displaying it IN PLAIN TEXT in the website itself (which to my surprise wasn't mentioned in the audit)), they probably haven't even looked at the report.2 -
!security
(Less a rant; more just annoyance)
The codebase at work has a public-facing admin login page. It isn't linked anywhere, so you must know the url to log in. It doesn't rate-limit you, or prevent attempts after `n` failures.
The passwords aren't stored in cleartext, thankfully. But reality isn't too much better: they're salted with an arbitrary string and MD5'd. The salt is pretty easy to guess. It's literally the company name + "Admin" 🙄
Admin passwords are also stored (hashed) in the seeds.rb file; fortunately on a private repo. (Depressingly, the database creds are stored in plain text in their own config file, but that's another project for another day.)
I'm going to rip out all of the authentication cruft and replace it with a proper bcrypt approach, temporary lockouts, rate limiting, and maybe with some clientside hashing, too, for added transport security.
But it's friday, so I must unfortunately wait. :<13 -
Pure evil and geniusness, this is a must read for JavaScript developers and security enthusiasts !
https://hackernoon.com/im-harvestin...
9 -
No, MD5 hash is not a safe way to store our users' passwords. I don't care if its been written in the past and still works. I've demonstrated how easy it is to reverse engineer and rainbow attack. I've told you your own password for the site! Now please let me fix it before someone else forces you to. We're too busy with other projects right now? Oh, ok then, I'll just be quiet and ignore our poor security. Whilst I'm busy getting on with my other work, could you figure out what we're gonna do with the tatters of our client's business (in which our company owns a stake) in the aftermath of the attack?7
-
left a company over 3 years ago because they wanted me to dumb my code down so that the other devs could understand it. they wouldn't allow me to use classes in my code lol. anyway, 3+ years later figured I would try to log in to some of the admin panels... passwords still the same. MySQL dbs... passwords the same... cpanel... passwords the same. smh. even if I still worked there the passwords should be changed every so often. top notch security right there. funniest part is they don't even do backups or use VCS for the code. sad sad company. glad I'm no longer there. my personal projects have more security, redundancy and fail over lol4
-
Adventures in security land.
The “legendary” lead dev authored a ticket that logs raw credentials for a third-party tool we’re using, and logs partially-obscured consumer passwords. His reasoning: “for debugging. And customer service!” And then argued with me over why that’s bad! Seriously?
Then in the release channel, he and the release manager are talking like I’m pestering them with my findings. Things like “I have some Root-induced changes coming” and “Fixed those, but she’ll probably have more...” etc.
Like come on.
I’m even being nice here, but you seriously need to stop screwing this up.
They also didn’t bother merging the fixes into the release branch, so I needed to re-review the entire (large) ticket on its own branch. Doubles the effort since I can’t easily see what changed.
The lead dev also only updated a few of the specs (despite me sending him a list), so there’s a bunch of failing ones now. Makes me unsure if he actually fixed everything.
Maybe I’m just being touchy, but ugh. Freaking annoying people.
At least he owned up to being the author this time instead of saying someone else (who wasn’t in the history...) wrote it. -.-8 -
- Guys, today the security auditors are coming, don't forget to remove your sticky notes with passwords. And for God's sake wear the badges for a least a day!
-
The company i work for has a jenkins server (for people that don't know jenkins, it's an automated build service that gets the latest git updates, pulls them and then builds, tests and deploys it)
Because it builds the software, people were scared to update it so we were running version 1.x for a long time, even when an exploit was found... Ooh boy did they learn from that...
The jenkins server had a hidden crypto miner running for about 5 days...
I don't know why we don't have detectors for that stuff... (like cpu load being high for 15 minutes)
I even tried to strengthen our security... You know basic stuff LIKE NOT SAVING PASSWORDS TO A GOOGLE SPREADSHEET! 😠
But they shoved it asside because they didn't have time... I tried multiple times but in the end i just gave up...13 -
Yesterday,
I was a bit drunk.
But I wanted to improve security of the company. So, I went in Azure and activated “Security defaults” which forces MFA for all users in the company. (Because RH always forget to enable MFA for new employees, and I actually care about security)
Then I went in office 365 management and instead of resetting MFA for all users (Forcing everyone to redo MFA setup), I (by mistake) clicked on reset all passwords.
I tested my own account it was fine and went to sleep.
Got a call from CEO at 7am, all 30 employees cannot login in, cannot work.
What a shit show I made…
I have a call with CEO in about 2 hours, I don’t even know how to justify myself…
So children: don’t activate company wide options while drunk. Ever.21 -
Security rant ahead - you have been warned.
It never fails to amuse and irritate me that, despite being in the 2019 supposed information age, people still don't understand or care about their security.
I've travelled to a lot of ports and a lot of countries, but, at EVERY port, without fail, there will be at least one wifi that:
- Has default name/password that has been cracked already (Thomson/SpeedTouch/Netfaster etc)
- Has a phone number as password (reduces crack time to 15-30 mins)
- Someone, to this day, has plain old WEP
I am not talking about cafeteria/store wifi but home networks. WTF people?! I can check my email (through VPN, of course) but it still bugs me. I have relented to try and snoop around the network - I can get carried away, which is bad. Still...
The speed is great though :P9 -
I have bank accounts with 5 different banks.
I HAVE TO use 4-5 different government websites.
Every fucking place: you cannot use these "~-/;^"(some others too) symbols in your password.
Are you freaking fucking kidding me!! And all of them have a limit of 12or15 characters.
If this wasn't mind numbingly stupid enough, they fucking go ahead and force you to change password every fucking month or two.
THIS IS NOT SECURITY. YOU SHOULDN'T FORCE SOMEONE TO LIMIT THERE PASSWORDS TO:
- CERTAIN CHARACTERS
- A 15 CHARACTER SIZE LIMIT
- THRN OVERTHAT, FORCE TO CHANGE PASSWPRDS PERIODICALLY.
ALL THE 5 MAJOR FUCKING BANKS IN INDIA.
FUUUUUCCCCKKKKK YOUU 🖕11 -
The tech stack at my current gig is the worst shit I’ve ever dealt with...
I can’t fucking stand programs, especially browser based programs, to open new windows. New tab, okay sure, ideally I just want the current tab I’m on to update when I click on a link.
Ticketing system: Autotask
Fucking opens up with a crappy piss poor sorting method and no proper filtering for ticket views. Nope you have to go create a fucking dashboard to parse/filter the shit you want to see. So I either have to go create a metric-arse tonne of custom ticket views and switch between them or just use the default turdburger view. Add to that that when I click on a ticket, it opens another fucking window with the ticket information. If I want to do time entry, it just feels some primal need to open another fucking window!!! Then even if I mark the ticket complete it just minimizes the goddamn second ticket window. So my jankbox-supreme PC that my company provided gets to strugglepuff along trying to keep 10 million chrome windows open. Yeah, sure 6GB of ram is great for IT work, especially when using hot steaming piles of trashjuice software!
I have to manually close these windows regularly throughout the day or the system just shits the bed and halts.
RMM tool: Continuum
This fucker takes the goddamn soggy waffle award for being utterly fucking useless. Same problem with the windows as autotask except this special snowflake likes to open a login prompt as a full-fuck-mothering-new window when we need to open a LMI rescue session!!! I need to enter a username and a password. That’s it! I don’t need a full screen window to enter credentials! FUCK!!! Btw the LMI tools only work like 70% of the time and drag ass compared to literally every other remote support tool I’ve ever used. I’ve found that it’s sometimes just faster to walk someone through enabling RDP on their system then remoting in from another system where LMI didn’t decide to be fully suicidal and just kill itself.
Our fucking chief asshat and sergeant fucknuts mcdoogal can’t fucking setup anything so the antivirus software is pushed to all client systems but everything is just set to the default site settings. Absolutely zero care or thought or effort was put forth and these gorilla spunk drinking, rimjob jockey motherfuckers sell this as a managed AntiVirus.
We use a shitty password manager than no one besides I use because there is a fully unencrypted oneNote notebook that everyone uses because fuck security right? “Sometimes it’s just faster to have the passwords at the ready without having to log into the password manager.” Chief Asshat in my first week on the job.
Not to mention that windows server is unlicensed in almost every client environment, the domain admin password is same across multiple client sites, is the same password to log into firewalls, and office 365 environments!!!
I’ve brought up tons of ways to fix these problems, but they have their heads so far up their own asses getting high on undeserved smugness since “they have been in business for almost ten years”. Like, Whoop Dee MotherFucking Doo! You have only been lucky to skate by with this dumpster fire you call a software stack, you could probably fill 10 olympic sized swimming pools to the brim with the logarrhea that flows from your gullets not only to us but also to your customers, and you won’t implement anything that is good for you, your company, or your poor clients because you take ten minutes to try and understand something new.
I’m fucking livid because I’m stuck in a position where I can’t just quit and work on my business full time. I’m married and have a 6m old baby. Between both my wife and I working we barely make ends meet and there’s absolutely zero reason that I couldn’t be providing better service to customers without having to lie through my teeth to them and I could easily support my family and be about 264826290461% happier!
But because we make so little, I can’t scrap together enough money to get Terranimbus (my startup) bootstrapped. We have zero expendable/savable income each month and it’s killing my soul. It’s so fucking frustrating knowing that a little time and some capital is all that stands between a better life for my family and I and being able to provide a better overall service out there over these kinds of shady as fuck knob gobblers.5 -
TL;DR I'm fucking sick and tired of Devs cutting corners on security! Things can't be simply hidden a bit; security needs to be integral to your entire process and solution. Please learn from my story and be one of the good guys!
As I mentioned before my company used plain text passwords in a legacy app (was not allowed to fix it) and that we finally moved away from it. A big win! However not the end of our issues.
Those Idiot still use hardcoded passwords in code. A practice that almost resulted in a leak of the DB admin password when we had to publish a repo for deployment purposes. Luckily I didn't search and there is something like BFG repo cleaner.
I have tried to remedy this by providing a nice library to handle all kinds of config (easy config injection) and a default json file that is always ignored by git. Although this helped a lot they still remain idiots.
The first project in another language and boom hardcoded password. Dev said I'll just remove before going live. First of all I don't believe him. Second of all I asked from history? "No a commit will be good enough..."
Last week we had to fix a leak of copyrighted contend.
How did this happen you ask? Well the secure upload field was not used because they thought that the normal one was good enough. "It's fine as long the URL to the file is not published. Besides now we can also use it to upload files that need to be published here"
This is so fucking stupid on so many levels. NEVER MIX SECURE AND INSECURE CONTENT it is confusing and hard to maintain. Hiding behind a URL that thousands of people have access to is also not going to work. We have the proof now...
Will they learn? Maybe for a short while but I remain sceptic. I hope a few DevrRanters do!7 -
Paranoid Developers - It's a long one
Backstory: I was a freelance web developer when I managed to land a place on a cyber security program with who I consider to be the world leaders in the field (details deliberately withheld; who's paranoid now?). Other than the basic security practices of web dev, my experience with Cyber was limited to the OU introduction course, so I was wholly unprepared for the level of, occasionally hysterical, paranoia that my fellow cohort seemed to perpetually live in. The following is a collection of stories from several of these people, because if I only wrote about one they would accuse me of providing too much data allowing an attacker to aggregate and steal their identity. They do use devrant so if you're reading this, know that I love you and that something is wrong with you.
That time when...
He wrote a social media network with end-to-end encryption before it was cool.
He wrote custom 64kb encryption for his academic HDD.
He removed the 3 HDD from his desktop and stored them in a safe, whenever he left the house.
He set up a pfsense virtualbox with a firewall policy to block the port the student monitoring software used (effectively rendering it useless and definitely in breach of the IT policy).
He used only hashes of passwords as passwords (which isn't actually good).
He kept a drill on the desk ready to destroy his HDD at a moments notice.
He started developing a device to drill through his HDD when he pushed a button. May or may not have finished it.
He set up a new email account for each individual online service.
He hosted a website from his own home server so he didn't have to host the files elsewhere (which is just awful for home network security).
He unplugged the home router and began scanning his devices and manually searching through the process list when his music stopped playing on the laptop several times (turns out he had a wobbly spacebar and the shaking washing machine provided enough jittering for a button press).
He brought his own privacy screen to work (remember, this is a security place, with like background checks and all sorts).
He gave his C programming coursework (a simple messaging program) 2048 bit encryption, which was not required.
He wrote a custom encryption for his other C programming coursework as well as writing out the enigma encryption because there was no library, again not required.
He bought a burner phone to visit the capital city.
He bought a burner phone whenever he left his hometown come to think of it.
He bought a smartphone online, wiped it and installed new firmware (it was Chinese; I'm not saying anything about the Chinese, you're the one thinking it).
He bought a smartphone and installed Kali Linux NetHunter so he could test WiFi networks he connected to before using them on his personal device.
(You might be noticing it's all he's. Maybe it is, maybe it isn't).
He ate a sim card.
He brought a balaclava to pentesting training (it was pretty meme).
He printed out his source code as a manual read-only method.
He made a rule on his academic email to block incoming mail from the academic body (to be fair this is a good spam policy).
He withdraws money from a different cashpoint everytime to avoid patterns in his behaviour (the irony).
He reported someone for hacking the centre's network when they built their own website for practice using XAMMP.
I'm going to stop there. I could tell you so many more stories about these guys, some about them being paranoid and some about the stupid antics Cyber Security and Information Assurance students get up to. Well done for making it this far. Hope you enjoyed it.
26 -
We recently took over development of an app. Upon inspection the API had no security, and passwords were stored in plain text. While the manager was slightly concerned, it wasn't a big deal....
That was until, using only a browser, I found the bosses account and personal email address.
Minutes later I was in his gmail, Facebook and credit cards account.
Improving security is now concern #1, and my boss is "suffering" 2 factor authy on everything.7 -
Wrost security fix ever seen?
encode that passwords in base64 is safe enough.
And keep the password.txt accessible from internet it's safe because nobody know that it exists...6 -
Recently, one of our passwords was accidently published on a public page for a few minutes before it was noticed and removed. Unfortunately, this password opens nearly every locked account so it's a pretty big deal.
Management was informed of this mistake and told that we should change the passwords as well as implement a few other protocols to make sure this doesn't happen again including things like unique passwords, more secure passwords, using a password manager, etc.
Their response? It wasn't online long, probably no one saw it. There will be no changes in how we handle ours or our clients' secure passwords.6 -
Oh the irony: one of the e-banks I use, forces users to type their passwords via virtual on screen keyboard (javascript based!!!) due to security 'standards' yet in the same breath doesn't allow a user to use any other character for password besides the basic alfanum.. o.O fml4
-
Microsoft brute-forces password-protected archives in OneDrive.
“Microsoft will decrypt, open, and scan protected Zip archives uploaded to the company's cloud servers in search of potential computer threats. Security researcher Andrew Brandt recently discovered the issue while trying to share malware samples with other researchers through SharePoint.”
This is when I encrypt my archives, I use _very_ long passwords generated by Bitwarden. Like this: qkYdE5i@27yHTTj8YsMDKQ9^mo$j@!P^M4qA95Y5VqR*53otAMuMv$9sdxtF4HAuNdAYoW9RPVxucJ3
Good luck bruteforcing that, Microsoft!
https://techspot.com/news/...
10 -
I think we're going two sides:
For one, more and more technology is being developed/engineered which is even more and more and more intrusive as for personal privacy, I'm genuinely worried how this'll go as privacy isn't just a about not exposing certain things like passwords/bank account details and so on, it's also about being an individual who has their own thoughts, opinions and so on. If we keep taking that away more and more often, society will change and go towards the Orwell scenario (we're on our way there right now). We can change this as software/design/server engineers but that's up to us and I sadly don't see that happening quickly, also due to the 'nothing to hide' bullshit.
Second one is that were going more and more towards open source.
This is a good thing as this:
- gives freedom to devs around the world to improve software and/or modify it to suit their needs.
- gives people the opportunity to look through the source code of softwares in order to verify it as for backdoors and find security vulnerabilities which otherwise can remain hidden for the general public while spying agencies have way more resources to go vulnerability hunting.
For the people who think this isn't a good idea (even more open source), without it we'd be completely fucked as for moving forward/security/privacy. (I can give examples if wanted).3 -
My argument: Password change policies (every 3, 6 moths, etc.) are a detriment to security because users will either come up with simple, throw-away passwords (knowing they will need to change them soon anyways) or use the same password anyways with a few variations.
Discuss.18 -
Our sysadmin just wrote our new work account passwords on our office whiteboard, visible to everyone... Now that's how you create chaos2
-
Finally got a new job, but it's already a horror story not even 2 hours in (making this while on break)
Everyone here is an Intern, IT? Interns, Designers? Interns, HR? Interns.
The Person who I should've worked with got fired yesterday, and now I have to work all of his shit up from 0, Documentation? Fragmental, a few things here and there, but nothing really.
IT security also doesn't exist in the slightest, there is an Excel sheet called "Master_Passwords" and every single password is in Plaintext, written out for everyone to see. (at least they used "strong" passwords)
And the place also looks run down, theres PC's, Laptops, Mics, Cables etc. lying literally everywhere no-one knows what works and what doesn't (since everyone is an intern)
Not to mention the "Server Room" is an absolute mess itself, cables hanging from literally anywhere, powerstrips are ontop of servers, each rack has like 2 or 3 2U Servers, (in a 40u Rack) and there are 10 of them!4 -
My school just tried to hinder my revision for finals now. They've denied me access just today of SSHing into my home computer. Vim & a filesystem is soo much better than pen and paper.
So I went up to the sysadmin about this. His response: "We're not allowing it any more". That's it - no reason. Now let's just hope that the sysadmin was dumb enough to only block port 22, not my IP address, so I can just pick another port to expose at home. To be honest, I was surprised that he even knew what SSH was. I mean, sure, they're hired as sysadmins, so they should probably know that stuff, but the sysadmins in my school are fucking brain dead.
For one, they used to block Google, and every other HTTPS site on their WiFi network because of an invalid certificate. Now it's even more difficult to access google as you need to know the proxy settings.
They switched over to forcing me to remote desktop to access my files at home, instead of the old, faster, better shared web folder (Windows server 2012 please help).
But the worst of it includes apparently having no password on their SQL server, STORING FUCKING PASSWORDS IN PLAIN TEXT allowing someone to hijack my session, and just leaving a file unprotected with a shit load of people's names, parents, and home addresses. That's some super sketchy illegal shit.
So if you sysadmins happen to be reading this on devRant, INSTEAD OF WASTING YOUR FUCKING TIME BLOCKING MORE WEBSITES THAN THEIR ARE LIVING HUMANS, HOW ABOUT TRY UPPING YOUR SECURITY, PASSWORDS LIKE "", "", and "gryph0n" ARE SHIT - MAKE IT BETTER SO US STUDENTS CAN ACTUALLY BROWSE MORE FREELY - I THINK I WANT TO PASS, NOT HAVE EVERY OTHER THING BLOCKED.
Thankfully I'm leaving this school in 3 weeks after my last exam. Sure, I could stay on with this "highly reputable" school, but I don't want to be fucking lied to about computer studies, I don't want to have to workaround your shitty methods of blocking. As far as I can tell, half of the reputation is from cheating. The students and sysadmins shouldn't have to have an arms race between circumventing restrictions and blocking those circumventions. Just make your shit work for once.
**On second thought, actually keep it like that. Most of the people I see in the school are c***s anyway - they deserve to have half of everything they try to do censored. I won't be around to care soon.**undefined arms race fuck sysadmin ssh why can't you just have any fucking sanity school windows server security2 -
!!oracle
I'm trying to install a minecraft modpack to play with a friend, and I'm super psyced about it. According to the modpack instructions, the first step is to download the java8 jre. Not sure if I actually need it or not, but it can download while I'm doing everything else, so I dutifully go to the download page and find the appropriate version. The download link does point to the file, but redirects to a login page instead. Apparently I need an oracle account to download anything on their site. stupid.
So I make an account. It requires my life story, or at least full name and address and phone number. stupid. So my name is now "fuck off" and I live in Hell, Michigan. My email is also "gofuckyourself" because I'm feeling spiteful. Also, for some reason every character takes about 3/4ths of a second to type, so it's very slow going. Passwords also cannot contain spaces, which makes me think they're doing some stupid "security" shenanigans like custom reversible encryption with some 5th grade math. or they're just stupid. Whatever, I make the stupid account.
Afterwards, I try to log in, but apparently my browser-saved credentials are wrong? I try a few more times, try enabling all of the javascripts, etc. No beans. Okay, maybe I can't use it until I verify the email? That actually makes some sense. Fine, I go check the throwaway inbox. No verification email. It's been like five minutes, but it's oracle so they probably just failed at it like everything else, so I try to have them resend the email. I find the resend link, and try it. Every time I enter my email address, though, it either gives me a validation error or a server error. I try a few mores times, and give up. I try to log in again; no dice. Giving up, I go do something else for awhile.
On a whim later, I check for the verification email again. Apparently it just takes bloody forever, but it did show up. Except instead of the first name "Fuck" I entered, I'm now "Andrew", apparently. okay.... whatever. I click the verify button anyway, and to my surprise it actually works, and says that I'm now allowed to use my account. Yay!
So, I go back to the login page (from the download link) and enter my credentials. A new error appears! I cannot use redirects, apparently, and "must type in the page address I want to visit manually." huh? okay, i go to the page directly, and see the same bloody error because of course i do because oracle fucking sucks. So I close the page, go back to the download list, click the link, wait for the login page redirect (which is so totally not allowed, apparently, except it works and manual navigation does not. yay backwards!), and try to log in.
Instead of being presented with an error because of the redirect, it lets me (try to) log in. But despite using prefilled creds (and also copy/pasting), it tells me they're invalid. I open a new tab container, clear the cache (just to be thorough), and repeat the above steps. This time it redirects me to a single signon server page (their concept of oauth), and presents me with a system error telling me to contact "the Administrator." -.- Any second attempts, refreshes, etc. just display the same error.
Further attempts to log in from the download page fail with the same invalid credentials error as before.
Fucking oracle and their reverse Midas touch.10 -
Ten Immutable Laws Of Security
Law #1: If a bad guy can persuade you to run his program on your computer, it's not solely your computer anymore.
Law #2: If a bad guy can alter the operating system on your computer, it's not your computer anymore.
Law #3: If a bad guy has unrestricted physical access to your computer, it's not your computer anymore.
Law #4: If you allow a bad guy to run active content in your website, it's not your website any more.
Law #5: Weak passwords trump strong security.
Law #6: A computer is only as secure as the administrator is trustworthy.
Law #7: Encrypted data is only as secure as its decryption key.
Law #8: An out-of-date antimalware scanner is only marginally better than no scanner at all.
Law #9: Absolute anonymity isn't practically achievable, online or offline.
Law #10: Technology is not a panacea.3 -
Taking IT classes in college. The school bought us all lynda and office365 accounts but we can't use them because the classroom's network has been severed from the Active Directory server that holds our credentials. Because "hackers." (The non-IT classrooms don't have this problem, but they also don't need lynda accounts. What gives?)
So, I got bored, and irritated, so I decided to see just how secure the classroom really was.
It wasn't.
So I created a text file with the following rant and put it on the desktop of the "locked" admin account. Cheers. :)
1. don't make a show of "beefing up security" because that only makes people curious.
I'm referring of course to isolating the network. This wouldn't be a problem except:
2. don't restrict the good guys. only the bad guys.
I can't access resources for THIS CLASS that I use in THIS CLASS. That's a hassle.
It also gives me legitimate motivation to try to break your security.
3. don't secure it if you don't care. that is ALSO a hassle.
I know you don't care because you left secure boot off, no BIOS password, and nothing
stopping someone from using a different OS with fewer restrictions, or USB tethering,
or some sort malware, probably, in addition to security practices that are
wildly inconsistent, which leads me to the final and largest grievance:
4. don't give admin priveledges to an account without a password.
seriously. why would you do this? I don't understand.
you at least bothered to secure the accounts that don't even matter,
albeit with weak and publicly known passwords (that are the same on all machines),
but then you went and left the LEAST secure account with the MOST priveledges?
I could understand if it were just a single-user machine. Auto login as admin.
Lots of people do that and have a reason for it. But... no. I just... why?
anyway, don't worry, all I did was install python so I could play with scripting
during class. if that bothers you, trust me, you have much bigger problems.
I mean you no malice. just trying to help.
For real. Don't kick me out of school for being helpful. That would be unproductive.
Plus, maybe I'd be a good candidate for your cybersec track. haven't decided yet.
-- a guy who isn't very good at this and didn't have to be
have a nice day <3
oh, and I fixed the clock. you're welcome.2 -
CR: "Add x here (to y) so it fits our code standards"
> No other Y has an X. None.
CR: "Don't ever use .html_safe"
> ... Can't render html without it. Also, it's already been sanitized, literally by sanitize(), written by the security team.
CR: "Haven't seen the code yet; does X change when resetting the password?"
> The feature doesn't have or reference passwords. It doesn't touch anything even tangentially related to passwords.
> Also: GO READ THE CODE! THAT'S YOUR BLOODY JOB!
CR: "Add an 'expired?' method that returns '!active'?"
> Inactive doesn't mean expired. Yellow doesn't mean sour. There's already an 'is_expired?' method.
CR: "For logging, always use json so we can parse it. Doesn't matter if we can't read it; tools can."
CR: "For logging, never link log entries to user-readable code references; it's a security concern."
CR: "Make sure logging is human-readable and text-searchable and points back to the code."
> Confused asian guy, his hands raised.
CR: "Move this data formatting from the view into the model."
> No. Views are for formatting.
CR: "Use .html() here since you're working with html"
> .html() does not support html. It converts arrays into html.
NONE OF THIS IS USEFUL! WHY ARE YOU WASTING MY TIME IF YOU HAVEN'T EVEN READ MY CODE!?
dfjasklfagjklewrjakfljasdf4 -
So at work with the Macs we use, we have some guy come in after hours to service the Macs, and that means the security risk of leaving our passwords on our desks.
Not being a fan of this I tell my boss, he knows it's a risk and despite that he doesn't want this guy coming in while we're here.
Though my main problem is the Mac guy Steve is arrogant and thinks he's a know it all, and with the software I have on the Mac may end up deleting something important, I have git repo and all but I feel off just letting someone touch my computer without me being there.
I tell my boss about the software and stuff he just says contact Steve and tell him about it, to ignore the software and such, I say alright, I write up an email telling him not to touch the software listed and the folders of software documents (again it's all backed up).
No reply, I tell my boss and he says call him, I call him and he hangs up on me on the second ring!
Not sure if he's busy, but I left him a message, asking if he got my email, no reply and it's coming close to the end of the day (going to service Macs in the weekend)
I'm just not going to leave my info because if this guy can't check emails or even get back to someone why should I bother with this bullshit of risking my work.
From all the info I hear about him and my previous rants he's an arrogant prick who loves Macs.
Can't wait to leave this company, pretty sure leaving my password on my desk is a breach of our own security policy, and since 8-9 people are doing it, it's a major risk.
But he's friends with the CEO so apparently it's fuck our own security policy.11 -
- popunder background bitcoin miners did become a thing
- keybase android beta uploaded your privatekey to google servers "accidentally"
- you can spoof email headers via encoded chars, because most apps literally just render them apparently
- imgur leaked 1.7 million user accounts, protected by sha-256 "The company made sure to note that the compromised account information included only email addresses and passwords" - yeah "only", ofcourse imgur, ofcourse.
I guess the rant I did on Krahk etc. just roughly a month ago, can always be topped by something else.
sources:
https://www.mailsploit.com/index
https://bleepingcomputer.com/news/...
https://blog.malwarebytes.com/cyber...
https://helpnetsecurity.com/2017/...
undefined email spoofing email popunder bitcoin miners keybase android privatekey bitcoin imgur keybase imgur hacked mining6 -
It took forever to get SSH access to our office network computers from outside. Me and other coworkers were often told to "just use teamviewer", but we finally managed to get our way.
But bloody incompetents! There is a machine with SSH listening on port 22, user & root login enabled via password on the personal office computer.
"I CBA to setup a private key. It's useless anyways, who's ever gonna hack this computer? Don't be paranoid, a password is enough!"
A little more than 30 minutes later, I added the following to his .bashrc:
alias cat="eject -T && \cat"
alias cp="eject -T && \cp"
alias find="eject -T && \find"
alias grep="eject -T && \grep"
alias ls="eject -T && \ls"
alias mv="eject -T && \mv"
alias nano="eject -T && \nano"
alias rm="eject -T && \rm"
alias rsync="eject -T && \rsync"
alias ssh="eject -T && \ssh"
alias su="eject -T && \su"
alias sudo="eject -T && \sudo"
alias vboxmanage="eject -T && \vboxmanage"
alias vim="eject -T && \vim"
He's still trying to figure out what is happening.5 -
So... remember my first rants about my network at my last ship?
https://devrant.com/rants/2076759/...
https://devrant.com/rants/2076890/...
https://devrant.com/rants/2077084/...
Well... I had to visit them for an unrelated matter and found out that they are to pass general inspection the next week. Among the inspectors is a member of the cyber defence team. I took a quick look at the network, finding the things I'd expect:
- No updates passed to the server or installed since I left
- No antivirus updates since I left
- All certificates were expired
- Most services were shut down or unused
- All security policies were shut down
- Passwords (without expiration now) were written on post-it and stuck on screens
- ... and more!
I told the XO (the same idiot that complained about them CONSTANTLY) and he just shrugged me off and told me to """fix""" it. In one fucking afternoon.
I. SHIT. YOU. NOT.
The new admin there is a low ranking person who hasn't the faintest idea of how this works, and isn't willing to learn, either. They just dumped the duty on him, and he seems not to care. The cyber security inspector is going to have a field day. Or get grey hairs.
I told the XO that I needed at least a week to get them into working order (I have to re-set up my virtual Windows 2012 R2 server, download 2 years' worth of updates, repair 2 years of neglect etc.). The answer was what I expected:
"You know computers, you can do your magic and get it done in an afternoon."
Thank god I got transferred and don't have to answer to that idiot any more. Now, popcorn time, as I watch the fireworks.
Yes, I am a vengeful guy. I have told them, twice now, of what would happen. They didn't listen. At least now, with an official report on their heads, they just might.3 -
This is the most hilarious stackoverflow rant ever, quote:
"Strong cryptography only means the passwords must be encrypted while the user is inputting them but then they should be moved to a recoverable format for later use."
Full rant:
http://serverfault.com/questions/...5 -
Found an article on medium, which does make one think about the security of fetching things from npm and somebody "checking" the source on github.
“I’m harvesting credit card numbers and passwords from your site. Here’s how.” @D__Gilbertson https://hackernoon.com/im-harvestin...
3 -
We had an obligatory training today about security of remote access to company resources.
We sat for an hour listening to some outdated advice regarding passwords and preparing a work environment at home. Finally the instructor said his goodbyes and left. The rest of us stayed in the call to pass some actual recommendations.
Then we received a join request from a waiting lobby. Everyone muted. I let the guy in. For the next 8 minutes we watched the unaware instructor eat his breakfast and sign some documents stamped with a logotype of our competition.
Then I cleared my throat very loudly. He will have to print some of those documents again.4 -
TL; DR: Bringing up quantum computing is going to be the next catchall for everything and I'm already fucking sick of it.
Actual convo i had:
"You should really secure your AWS instance."
"Isnt my SSH key alone a good enough barrier?"
"There are hundreds of thousands of incidents where people either get hacked or commit it to github."
"Well i wont"
"Just start using IP/CIDR based filtering, or i will take your instance down."
"But SSH keys are going to be useless in a couple years due to QUANTUM FUCKING COMPUTING, so why wouldnt IP spoofing get even better?"
"Listen motherfucker, i may actually kill you, because today i dont have time for this. The whole point of IP-based security is that you cant look on Shodan for machines with open SSH ports. You want to talk about quantum computing??!! Lets fucking roll motherfucker. I dont think it will be in the next thousand years that we will even come close to fault-tolerant quantum computing.
And even if it did, there have been vulnerabilities in SSH before. How often do you update your instance? I can see the uptime is 395 days, so probably not fucking often! I bet you "dont have anything important anyways" on there! No stored passwords, no stored keys, no nothing, right (she absolutely did)? If you actually think I'm going to back down on this when i sit in the same room as the dude with the root keys to our account, you can kindly take your keyboard and shove it up your ass.
Christ, I bet that the reason you like quantum computing so much is because then you'll be able to get your deepfakes of miley cyrus easier you perv."8 -
Discord and captchas can go get fucked in the ass by a rusty, tetanus ridden 2m pole....
I changed my discord-password yesterday and, naturally it prompted me for a login today. So I enter my new password and that motherfucking spawn from satans anus himself with the name of captcha threw itself at me... I seriously had to select fucking street signs for about 5min before Discord let me know that I apparently logged in from a new IP (thanks VPN) and therefore needed to confirm my e-Mail address. Alright, so off to my inbox I go.
SURPRISE, I also changed my password there yesterday (LastPass Security Challenge, I changed like 30 passwords yesterday) and guess what was waiting for me?... If you guessed a captcha, you just got full fucking marks. So I was busy selecting busses and streets for the next 3min again before I could finally log into that piece of trash and autorize my IP-address and log into Discord6 -
Microsoft seriously hates security, first they do enforce an numer, upper and lowercase combined with a special character.
But then they allow no passwords longer than 16 characters....
After that they complain that "FuckMicrosoft!1" is a password they've seen to often, gee thanks for the brute force tips.
To add insult to injury the first displayed "tip" take a look at the attached image.
rant password security security 101 security fail annoyance passwords passwords stupid practices microsoft13 -
For security reasons and to have stronger passwords, my organization enforces us to use '@123' at the end of the password!! Dumb motherfuckers!! :P2
-
Tl;dr stupid password requirements
Begin quote
Password must not contain any non-alphanumeric characters.
Your Password change was not accepted. Enter your current Password correctly following the rules for New Passwords. Please try again.
Passwords must be between 8 and 12 characters in length and MUST contain each of the following:
At least 1 lower case character (a-z)
At least 1 upper case character (A-Z)
At least 1 numeric digit (0-9)
But, MUST NOT contain:
more than five repeating characters in a row (e.g. 111111356 would not be valid, but 112233445 would be valid)
spaces or other special characters
NOTE: Your new password cannot be the same as any of your 10 previous passwords.
End quote
Are you fucking kidding me? Only (26+26+10)^8 through
(26+26+10)^12 different passwords to go through? It's like the oxygen wasters that built this website give zero fucks about security.
Why? This is the site that manages money and investments. Just allow passwords up to 64 characters, allow any ascii character and just fucking encod the characters to prevent any Injunction.4 -
So... did I mention I sometimes hate banks?
But I'll start at the beginning.
In the beginning, the big bang created the universe and evolution created humans, penguins, polar bea... oh well, fuck it, a couple million years fast forward...
Your trusted, local flightless bird walks into a bank to open an account. This, on its own, was a mistake, but opening an online bank account as a minor (which I was before I turned 18, because that was how things worked) was not that easy at the time.
So, yours truly of course signs a contract, binding me to follow the BSI Grundschutz (A basic security standard in Germany, it's not a law, but part of some contracts. It contains basic security advice like "don't run unknown software, install antivirus/firewall, use strong passwords", so it's just a basic prototype for a security policy).
The copy provided with my contract states a minimum password length of 8 (somewhat reasonable if you don't limit yourself to alphanumeric, include the entire UTF 8 standard and so on).
The bank's online banking password length is limited to 5 characters. So... fuck the contract, huh?
Calling support, they claimed that it is a "technical neccessity" (I never state my job when calling a support line. The more skilled people on the other hand notice it sooner or later, the others - why bother telling them) and that it is "stored encrypted". Why they use a nonstandard way of storing and encrypting it and making it that easy to brute-force it... no idea.
However, after three login attempts, the account is blocked, so a brute force attack turns into a DOS attack.
And since the only way to unblock it is to physically appear in a branch, you just would need to hit a couple thousand accounts in a neighbourhood (not a lot if you use bots and know a thing or two about the syntax of IBAN numbers) and fill up all the branches with lots of potential hostages for your planned heist or terrorist attack. Quite useful.
So, after getting nowhere with the support - After suggesting to change my username to something cryptic and insisting that their homegrown, 2FA would prevent attacks. Unless someone would login (which worked without 2FA because the 2FA only is used when moving money), report the card missing, request a new one to a different address and log in with that. Which, you know, is quite likely to happen and be blamed on the customer.
So... I went to cancel my account there - seeing as I could not fulfill my contract as a customer. I've signed to use a minimum password length of 8. I can only use a password length of 5.
Contract void. Sometimes, I love dealing with idiots.
And these people are in charge of billions of money, stock and assets. I think I'll move to... idk, Antarctica?4 -
Read a blog post at work yesterday from the company head of IT security. Line 1:
As part of our company policy we enforce the use of usernames and passwords, known as two factor authentication. However we also need to ensure.....
Stopped listening at this point as I hit Google to confirm the definition of two factor auth.
Nope I'm not loosing my mind, the blog post is insane....1 -
Let's teach the class about security. OK *spends 1.5 hr teaching about encryption and practices* OK now students make a login page and just store the passwords in a JavaScript array....... *Facepalm*7
-
When you spend 5+ minutes creating a secure password for your new bank account and you get a message saying the password must be between 6 and 12 characters long.
Not sure I want to open this account any more.
Fuck me.6 -
Howdy this is a daily reminder on why you can't trust anyone with shared information.
I am back home from uni for the holidays and like any computer person who is back in town became responsible for fixing every tech problem that has occurred since my last visit. But what caught my eye when I approached the family computer is not the problem with the computer itself, it's the paper in front of the computer that, in giant lettering, has not only the passwords and account names of my mom and brother's AOL (She's old ok) and FAFSA account respectively but also someone's social security number. Any goddam baffoon who looks through the window or is able to take literally three goddam steps past the front door now has enough information to commit identity theft or just take over one of their accounts. I know it's not that likely but I still had a heart attack when I saw that.
How badly have I failed them?1 -
Security Horror Story:
A password authenticator which is case-insensitive and all special characters are treated as the same value. As a bonus, all passwords are truncated to 4 characters.2 -
More than 2 years ago I alerted management that the default password we use for client accounts (and two of the variations) were pwned in database breaches. Today we receive an all-staff email that management "has reason to believe this password may have been compromised" and that we needed to change it across the 1200+ accounts where it's being used (200+ clients, several accounts per client).
Is it unprofessional to send a few "I told you so" memes and gifs?7 -
Today I learned that bugs in Proxmox aren't bugs because they're not *exactly* within the scope of le fancy PVE web UI.
Today I also learned that running Samba on the PVE host is stupid. No real reasons but let's assume security. Well it's decently secured, has good passwords, and the killer is.. it isn't even fucking accessible to the internet! And even if it was, privilege separation is no secret to me.
But clearly I'm an idiot for even thinking about running Samba on PVE. Well guess what?! PVE is aimed at sysadmins that want to deploy a virtualization server. It's not a big stretch to imagine that those sysadmins might be halfway competent and want to run external services on the PVE host, is it.
But apparently it is. I'm an idiot and bugs aren't bugs anymore. Go fucking kill yourself, motherfuckers in the ##proxmox IRC channel. I really hope that your servers will go down on Friday when you're on call. Fucking cunts 😑
Edit: IRC chatlog @ https://clbin.com/nU9Fu13 -
Our new COO has decided to migrate our passwords from to a new password manager (due to security concerns).
But now, nearly 75% of our passwords are just 'missing' and we don't have access anymore to our first password manager and it's been emptied out.
AFAIK, the COO still has all the passwords but not shared. He is not responding to my mails / team message from the past day.10 -
Storing DB credentials in a repo that were encrypted using functions... that are in the same repo (both encrypt and decrypt!)...2
-
A few days ago Aruba Cloud terminated my VPS's without notice (shortly after my previous rant about email spam). The reason behind it is rather mundane - while slightly tipsy I wanted to send some traffic back to those Chinese smtp-shop assholes.
Around half an hour later I found that e1.nixmagic.com had lost its network link. I logged into the admin panel at Aruba and connected to the recovery console. In the kernel log there was a mention of the main network link being unresponsive. Apparently Aruba Cloud's automated systems had cut it off.
Shortly afterwards I got an email about the suspension, requested that I get back to them within 72 hours.. despite the email being from a noreply address. Big brain right there.
Now one server wasn't yet a reason to consider this a major outage. I did have 3 edge nodes, all of which had equal duties and importance in the network. However an hour later I found that Aruba had also shut down the other 2 instances, despite those doing nothing wrong. Another hour later I found my account limited, unable to login to the admin panel. Oh and did I mention that for anything in that admin panel, you have to login to the customer area first? And that the account ID used to login there is more secure than the password? Yeah their password security is that good. Normally my passwords would be 64 random characters.. not there.
So with all my servers now gone, I immediately considered it an emergency. Aruba's employees had already left the office, and wouldn't get back to me until the next day (on-call be damned I guess?). So I had to immediately pull an all-nighter and deploy new servers elsewhere and move my DNS records to those ASAP. For that I chose Hetzner.
Now at Hetzner I was actually very pleasantly surprised at just how clean the interface was, how it puts the project front and center in everything, and just tells you "this is what this is and what it does", nothing else. Despite being a sysadmin myself, I find the hosting part of it insignificant. The project - the application that is to be hosted - that's what's important. Administration of a datacenter on the other hand is background stuff. Aruba's interface is very cluttered, on Hetzner it's super clean. Night and day difference.
Oh and the specs are better for the same price, the password security is actually decent, and the servers are already up despite me not having paid for anything yet. That's incredible if you ask me.. they actually trust a new customer to pay the bills afterwards. How about you Aruba Cloud? Oh yeah.. too much to ask for right. Even the network isn't something you can trust a long-time customer of yours with.
So everything has been set up again now, and there are some things I would like to stress about hosting providers.
You don't own the hardware. While you do have root access, you don't have hardware access at all. Remember that therefore you can't store anything on it that you can't afford to lose, have stolen, or otherwise compromised. This is something I kept in mind when I made my servers. The edge nodes do nothing but reverse proxying the services from my LXC containers at home. Therefore the edge nodes could go down, while the worker nodes still kept running. All that was necessary was a new set of reverse proxies. On the other hand, if e.g. my Gitea server were to be hosted directly on those VPS's, losing that would've been devastating. All my configs, projects, mirrors and shit are hosted there.
Also remember that your hosting provider can terminate you at any time, for any reason. Server redundancy is not enough. If you can afford multiple redundant servers, get them at different hosting providers. I've looked at Aruba Cloud's Terms of Use and this is indeed something they were legally allowed to do. Any reason, any time, no notice. They covered all their bases. Make sure you do too, and hope that you'll never need it.
Oh, right - this is a rant - Aruba Cloud you are a bunch of assholes. Kindly take a 1Gbps DDoS attack up your ass in exchange for that termination without notice, will you?4 -
I know folks do their best, but come on Apple, this can't be that hard. Bought an IPhone at an estate sale (elderly individual died suddenly, so no one had knowledge of the apple id, passwords, etc) and I've been trying to convince apple to clear the activation lock. (AS = Apple Support)
<after explaining the situation>
AS: "Have you tried putting the phone in recovery mode? That should clear the lock"
Me: "I've already done that. It prompts for the apple id and password, which I don't have"
AS: "You need to talk to the owner and get the information"
Me: "As I explained, I purchased the phone at an estate sale of someone who died. I have the bill of sale, serial number, the box, obituary. What else do you need?"
AS: "Have you tried contacting a family member? They might have have that information."
Me: "The family members at the sale told us this is all they had. This kind of thing has to happen. I can't believe Apple can't clear the activation lock."
AS: "Yes, we can, but I'm very sorry we take security seriously."
Me: "I understand, what do I do now?"
AS: "Did you log out of the phone? Go to settings ..."
Me: "Yes, I tried all those steps before calling. It prompts for the AppleID and password."
AS: "Did you try entering the password?"
Me: "No, I don't have it. I already explained there is no way to know"
AS: "Yes..yes...sorry...I'm just reading the information in front of me. I found something, have you tried submitting a activation lock removal request?"
Me: "Yes, it was denied, didn't tell me why, which is why I'm calling. What about taking this phone to an Apple store? I have all the paperwork."
AS: "Sure, you can try. You might need the death certificate. The family or the coroner will have a copy."
Me: "What!? Apple requires a death certificate to unlock a phone!? I'm pretty sure not even the family is going to give a total stranger a death certificate"
AS: "Sorry sir, I'm just reading what is in front of me. Without that certificate, there is no way to prove the person died. You can try the Apple store, but they will likely require it."
Me: "That's a lot of drama for unlocking a phone. A *phone*"
AS: "Yes sir, I understand. If there anything else we can do let us know and thank you for being an a apple customer."
Next stop, the Apple Store.9 -
Expert: "The core problem with passwords is that they reside on a server."
I suppose that's true, but only if you're a complete moron. Store a hash of a password, and users can authenticate against it with a password that doesn't get logged. This is technology that's been around for over fifty years. If you're storing passwords on a server, you deserve whatever trouble you get.6 -
Today my fellow @EaZyCode found out a local Hosting Provider has a massive security breach.
He wrote an Plugin for Minecraft with an own file explorer and the ability to execute runtime commands over it.
We discovered that this specific hosting provider stores the ftp passwords one level above the FTP-Root. In FUCKING PLAIN TEXT! AND THE MYSQL PASSWORD TOO! And even more shit is stored there ready to be viewed by intelligent people...
It's one of the fucking biggest Hosting provider Germanys!
But, because EaZyCode has such a great mind and always find such bugs, I give him the title "Providers Endboss" today, he has earned it.
Loving you ❤️
Edit: we used SendMail with runtime commands and sended too many empty Spammails (regret noting)18 -
In other news, I have been forbidden by my boss to implement any security or performance improvements into the company infrastructure as this holds no business value. Furthermore, passwords are not to be a random alphanumeric+special-chars string but something legible.14
-
A lot of larger companies seem to be a happy about forcing employees to change their password every three months or so. They do it for security measures so that it is more difficult to break through the system, however most people end up making the worst passwords.
Instead of forcing a very good password on them every year or two maybe, they all end up having passwords like: "Summer16", "Qwer1234", "London15".
I used to work for our national police, and this was the case there as well...7 -
Security fail here. I've just started a PPI claim and have been provided a link to a so called "very secure" client area.
There are no username or passwords and the screenshot is not a first time sign up screen.
All I need to login is a surname, postcode and DOB - all information easy enough to find online.
Pretty bad IMO, esp, so considering the effort required to add a proper login using a username/password combination.
I mean I'm logged in now and have no option to set an account password :|
3 -
Following on from my school having terrible passwords. Turns out they stored all our passwords in plain text somewhere - so some script kiddie (Do you even need to be a script kiddie to find this - probably not, but the guy who did this was a script kiddie) could just remote log me out twice, log in as me, be a twat, and have a conversation in Notepad.
1 -
So I enventually spent 2 years working for that company with a strong b2b market. Everything from the checkouts in their 6 b2c stores to the softwares used by the 30-people sales team was dependant on the main ERP shit home-built with this monstruosity we call Windev here in France. If you don't know it just google and have some laugh : this is a proprieteray FRENCH language. Not french like made by french people, well that too, but mostly french like the fucking language is un fucking french ! Instructions are on french, everything. Hey that's my natural language okay, but for code, really ?
The php website was using the ERP database too, even all the software/hardware of the massive logistic installation they had (like a tiny Amazon depot), and of course the emails of all employees. Everything was just handled by this unique shitty and so sloooooow fucking app. When there was to many clients on the website or even too many salespeople connected to the ERP at the same time, every-fuckin-piece of the company was slowing down, and even worse facing critical bugs. So they installed a monitor in the corner of a desk constantly showing the live report page of Google analytics and they started panic attacks everytime it was counting more than 30 sessions on the website. That was at the time fun and sad to observe.
The whole shit was created 12 years ago and is since maintened locally by one unique old-fashion-microsoft dev who also have to maintain all the hardware of all the fucking 150+ people business. You know, when the keyboard of anyone is "broken" cause it's unplugged... That's his job too. The poor guy was totally overstressed on a daily basis and his tech knowledge just saddly losts themeselves somewhere in the way. He was my n+1 in a tech team of 3 people : him, a young and inexperimented so-called "php developer" who was in charge of the website (btw full of security holes I discovered and dealed with when I first arrive at the job), and myself.
The database was a hell of 100+ tables of business and marketing data with a ton of specific logic added on-the-go during years. No consistent data model or naming. No utf8. Fucked up relations that ends with queries long enough to fill books. And that's not all, all the customers passwords was just stored there uncrypted. Several very big companies and administrations were some of these clients. I was insisting on the passwords point litterally all the time, that was an easy security fix and a good start... But no, in two years of discussions on the subject I never achieved to have them focusing on other considerations than "our customers like that we can remind them their password by a simple phone call if they lost it". What. The. Fuck. WHATTHEFUCK!
Eventually I ran myself out of this nightmare. I had a few bad jobs already, and worked on shitty software already. But that one really blows my mind (and motivation for a time too). Happy it's over.1 -
My university has a internal developed system, where everything is managed from e-mails, exams to personal data.
What I'd like most about it, they talk all day about Internet Security and store our passwords in plain text and if you press the "I've forgott my Password button", they even send your password unencrypted, plaintext via e-mail. (Hello Wiresharks)
I don't know how to feel about this, it just hurts :(1 -
"Using MD5" !? What year are we in again?
NOTICE OF DATA BREACH
Dear Yahoo User,
We are writing to inform you about a data security issue that may involve your Yahoo account information. We have taken steps to secure your account and are working closely with law enforcement.
...
What Information Was Involved?
The stolen user account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (using MD5)2 -
*follow-up to https://devrant.com/rants/1887422*
The burnt remnants of my ID card's authentication information, waiting for the wind to come pick it up. It's stored in my password database now and committed to my git server, as it should be. Storing PIN and PUK codes on paper, whatever government cunt thought thought that that was a good idea...
If you've got identification papers containing authentication information like PIN and PUK codes, by all means add them to your password manager (if you're using Linux, I'd like to recommend GNU Pass) at once and burn the physical version. There's no reason why you'd want those on paper, unless you store your passwords on a post-it too.
At least that's as much as me and possibly you as citizens can do. Our governments are doomed anyway, given the shitty security policy they have, and likely the many COBOL mainframes still in use today. Honestly, the meddlings of Russia with the US elections doesn't seem too far-fetched, given this status quo. It actually surprises me that this kind of stuff doesn't happen more often, given that certain governments hire private pentesters yet can't secure their own infrastructure.
-
Hmm...recently I've seen an increase in the idea of raising security awareness at a user level...but really now , it gets me thinking , why not raise security awareness at a coding level ? Just having one guy do encryption and encoding most certainly isn't enough for an app to be considered secure . In this day an age where most apps are web based and even open source some of them , I think that first of all it should be our duty to protect the customer/consumer rather than make him protect himself . Most of everyone knows how to get user input from the UI but how many out here actually think that the normal dummy user might actually type unintentional malicious code which would break the app or give him access to something he shouldn't be allowed into ? I've seen very few developers/software architects/engineers actually take the blame for insecure code . I've seen people build apps starting on an unacceptable idea security wise and then in the end thinking of patching in filters , encryptions , encodings , tokens and days before release realise that their app is half broken because they didn't start the whole project in a more secure way for the user .
Just my two cents...we as devs should be more aware of coding in a way that makes apps more secure from and for the user rather than saying that we had some epic mythical hackers pull all the user tables that also contained unhashed unencrypted passwords by using magix . It certainly isn't magic , it's just our bad coding that lets outside code interact with our own code . -
I am doing some freelance work for a client who is thankfully mindful about security. I found out that they are so strict with their access because they had a huge data breach last year.
Today I was given access to their repo for connecting to their AS400. In the docker file the username and password were included and were the same for dev and prod. They also are performing no sql injection prevention. They are just joining strings together.1 -
I set up unRAID on my server this weekend, and only just checked my logs to see if anything weird was happening. Turns out 2 IPs have been trying to brute-force the SSH password all weekend. I quickly installed the DenyHosts plugin and reminded myself to always use a strong password, which luckily I did.
A bit later now, and one of the 2 gave up, the other one keeps trying but of course the connection is refused. Just keep trying buddy :P6 -
Why are the MOST important passwords in my life (banks, financial, insurance) the LEAST secure (i.e. Max length 12, no special chars)
-
Social Captain (a service to increase a user's Instagram followers) has exposed thousands of Instagram account passwords. The company says it helps thousands of users to grow their Instagram follower counts by connecting their accounts to its platform. Users are asked to enter their Instagram username and password into the platform to get started.
According to TechCrunch : Social Captain was storing the passwords of linked Instagram accounts in unencrypted plaintext. Any user who viewed the web page source code on their Social Captain profile page could see their Instagram username and password in plain text, as they had connected their account to the platform. A website bug allowed anyone access to any Social Captain user's profile without having to log in ; simply plugging in a user's unique account ID into the company's web address would grant access to their Social Captain account and their Instagram login credentials. Because the user account IDs were for the most part sequential, it was possible to access any user's account and view their Instagram password and other account information easily. The security researcher who reported the vulnerability provided a spreadsheet of about 10,000 scraped user accounts to TechCrunch.3 -
I'd never do anything "risky" in a prod environment if I considered it so at the time, but in retrospect there's *lots* of things considered risky now (both from a security and good practice viewpoint) that were standard practice not long ago:
- Not using any form of version control
- No tests (including no unit tests)
- Not considering XSS vulnerabilities
- Completely ignoring CSRF vulnerabilities
- Storing passwords as unsalted MD5 hashes (heck that was considered very *secure* in the days of plaintext password storage.)
...etc. I'm guilty of all of those previously. I daresay in the future there will be yet more things that may be standard practice now, but become taboos we look back on with similar disdain.1 -
Have you ever had the moment when you were left speechless because a software system was so fucked up and you just sat there and didn't know how to grasp it? I've seen some pretty bad code, products and services but yesterday I got to the next level.
A little background: I live in Europe and we have GDPR so we are required by law to protect our customer data. We need quite a bit to fulfill our services and it is stored in our ERP system which is developed by another company.
My job is to develop services that interact with that system and they provided me with a REST service to achieve that. Since I know how sensitive that data is, I took extra good care of how I processed the data, stored secrets and so on.
Yesterday, when I was developing a new feature, my first WTF moment happened: I was able to see the passwords of every user - in CLEAR TEXT!!
I sat there and was just shocked: We trust you with our most valuable data and you can't even hash our fuckn passwords?
But that was not the end: After I grabbed a coffee and digested what I just saw, I continued to think: OK, I'm logged in with my user and I have pretty massive rights to the system. Since I now knew all the passwords of my colleagues, I could just try it with a different account and see if that works out too.
I found a nice user "test" (guess the password), logged on to the service and tried the same query again. With the same result. You can guess how mad I was - I immediately changed my password to a pretty hard.
And it didn't even end there because obviously user "test" also had full write access to the system and was probably very happy when I made him admin before deleting him on his own credentials.
It never happened to me - I just sat there and didn't know if I should laugh or cry, I even had a small existential crisis because why the fuck do I put any effort in it when the people who are supposed to put a lot of effort in it don't give a shit?
It took them half a day to fix the security issues but now I have 0 trust in the company and the people working for it.
So why - if it only takes you half a day to do the job you are supposed (and requires by law) to do - would you just not do it? Because I was already mildly annoyed of your 2+ months delay at the initial setup (and had to break my own promises to my boss)?
By sharing this story, I want to encourage everyone to have a little thought on the consequences that bad software can have on your company, your customers and your fellow devs who have to use your services.
I'm not a security guy but I guess every developer should have a basic understanding of security, especially in a GDPR area.2 -
So my brother went back to school today. Now, during the 5 years I was there they had the most shit security on their IT systems, but aparently now they have fucked up their ssl. If you try to load the https page it comes up with the warning saying its an invalid certificate, but once you click it, it doesn't even load the school website, it loads this random page. Clicking on the buttons then take you to a page under their domain provided by another school. Going to this schools website, the https seems to be broken in the exact same way. It wouldnt be so bad, but it can confuse the hell out of people who type https before a url, and thos who dont realise and end up on the insecure site will need to provide passwords over an insecure connection. I am so glad im out of that place, they had such crap IT and everything was so easy to break.
1 -
Speaking of.. What in your opinion would be an appropriate way to warn someone about security problems, like db passwords in git?
I once came across dozens of extremely sensitive services' infra accesses: alibaba/aliexpress, natuonal observatories, gov institutions, telecomms, etc. I had dozens [if not hundreds] routers' and firewalls' credentials along with addresses. I tried one to confirm validity - it worked. I wanted to warn them but did not want to get in trouble.
If it were servers, I'd set a motd or append some warning messages in .profile. But not sure how to do it for non-server devices
what would you do? How would you warn them?
P.S. Deleting that record was a smart move, buddy ;)
p.P.S. Sorry, wrong category... Can't edit now :(6 -
I don't know why is that everytime you guys find a security bug or a data leak or that someone is saving plain passwords on their database, you try to cover and censor the company name. Listen people, fuck the company and their name and their brand if someone's data might be in danger. Everybody should be aware of what is happening with their personal information.
Also, maybe would be great if devRant would let users to post anonymous rants for this kind of issues or a special thread with latest news about our online security.3 -
Let's talk about the cargo cult of N-factor authentication. It's not some magic security dust you can just sprinkle onto your app "for security purposes".
I once had a client who had a client who I did server maintenance for. Every month I was scheduled to go to the site, stick my fingerprint in their scanner, which would then display my recorded face prominently on their screens, have my name and purpose verified by the contact person, and only then would the guards let me in.
HAHA no of course not. On top of all of that, they ask for a company ID and will not let me in without one.
Because after all, I can easily forge my face, fingerprints, on-site client contact, appointment, and approval. But printing out and laminating a company ID is impossible.
---
With apologies to my "first best friend" in High School, I've forgotten which of the dozens of canonicalisations of which of your nicknames I've put in as my answer to your security question. I've also forgotten if I actually listed you as my first best friend, or my dog - which would actually be more accurate - and actually which dog, as there are times in my High School life that there were more tails than humans in the house.
I have not forgotten these out of spite, but simply because I have also forgotten which of the dozen services of this prominent bullshit computer company I actually signed up for way back in college, which itself has been more than a decade ago. That I actually apparently already signed up for the service before actually eludes me, because in fact, I have no love for their myriad products.
What I have NOT forgotten is my "end of the universe"-grade password, or email, or full legal name and the ability to demonstrate a clear line of continuity of my identity from wherever that was to now.
Because of previous security screwups in the past, this prominent bullshit company has forced its users to activate its second, third, and Nth factors. A possibly decade-old security question; a phone number long lost; whatever - before you can use your account.
Note: not "view sensitive data" about the account, like full name, billing address, and contact info. Not "change settings" of the account, such as changing account info, email, etc. Apparently all those are the lowest tier of security meant to be protected by mere "end of the universe"-grade passwords and a second factor such as email, which itself is likely to be sold by a company that also cargo cults N-factor auth. For REAL hard info, let's ask the guy who we just showed the address to "What street he lived in" and a couple others.
Explaining this to the company's support hotline is an exercise in...
"It's for your security."
"It's not. You're just locking me out of my account. I can show you a government ID corroborating all the other account info."
"But we can't, for security."
"It's not security. Get me your boss."
...
"It's for security."8 -
Best password manager?
I usually use the post-it-jutsu art to save my passwords.
But I think that when you have too much passwords, there should be a better way to store your info.19 -
The most annoying hack I've had to deal with was back when I did IT support, actually. Level 1 call center tech at the time. Apparently someone fell for a phishing email and gave out his outlook credentials. The phisher used that email account to send out another phishing email to roughly 1800 employees.
Security Operations noticed, because this guy's job didn't generally involve sending out mass-communication emails. They investigated, figured out what had happened, and opted for the nuclear option: they reset the password for EVERY SINGLE ACCOUNT that received the email. All 1800 of them. Over the weekend.
I walked into the call center Monday morning and checked the call stats, then did a double-take. There were over 300 people waiting in the queue. I almost left and called in sick. Turns out it wasn't that bad though. Annoying to reset so many passwords and having no downtime due to the full queue, but on the other hand my stats were better that day than any other, since every call was a 5-minute password reset.1 -
*leaning back in the story chair*
One night, a long time ago, I was playing computer games with my closest friends through the night. We would meet for a whole weekend extended through some holiday to excessively celebrate our collaborative and competitive gaming skills. In other words we would definitely kick our asses all the time. Laughing at each other for every kill we made and game we won. Crying for every kill received and game lost. A great fun that was.
Sleep level through the first 48 hours was around 0 hours. After some fresh air I thought it would be a very good idea to sit down, taking the time to eventually change all my accounts passwords including the password safe master password. Of course I also had to generate a new key file. You can't be too serious about security these days.
One additional 48 hours, including 13 hours of sleep, some good rounds Call of Duty, Counter Strike and Crashday plus an insane Star Wars Marathon in between later...
I woke up. A tiereing but fun weekend was over again. After I got the usual cereals for breakfast I set down to work on one of my theory magic decks. I opened the browser, navigated to the Web page and opened my password manager. I type in the password as usual.
Error: incorrect password.
I retry about 20 times. Each time getting more and more terrified.
WTF? Did I change my password or what?...
Fuck.
Ffuck fuck fuck FUCKK.
I've reset and now forgotten my master password. I completely lost memory of that moment. I'm screwed.
---
Disclaimer: sure it's in my brain, but it's still data right?
I remembered the situation but until today I can't remember which password I set.
Fun fact. I also could not remember the contents of episode 6 by the time we started the movie although I'd seen the movie about 10 - 15 times up to that point. Just brain afk. -
Goddamit I hate it when services advertise how they are about security and then deny me using random readable words with hyphens as passwords.2
-
Short sad story:
The backend team in my company stores plain text passwords and I am making a view in the website to view all the users password in the system13 -
Just found out today via Reddit that Wells Fargo, American Express (not personally confirmed), and Chase login passwords are NOT case sensitive!
I would check your bank too!2 -
This is the kind of company that provides online ticket sales for one of the bigger cinemas in Italy. Yes, registration is unavoidable.
1 -
If I have to change my domain password every 3 months for a bullshit out of date security policy (there's plenty of evidence suggesting that changing passwords is actually worse security), then maybe, just FUCKING maybe, make sure that that password change appropriately filters down to things like SQL Server so I can keep doing my goddamn work.7
-
***ILLEGAL***
so its IPL(cricket) season in india, there is a OTT service called hotstar (its like netflix of india), the cricket streams exclusively on hotstar..
so a quick google search reveals literally thousands of emails & passwords, found a pastebin containing 500 emails&passwords ...but those are leaked last year most of passwords are changed & many of them enabled 2FA.. after looking through them we can find some passwords are similar to their emails , some contains birth year like 1975,1997 etc, some passwords end with 123 ..so after trying a few different versions of the passwords like
1) password123 -> password@123, password1234
2) passwordyear -> password@year
2) for passwords similar to emails, we can add 123 ,1234, @ etc
created a quick python script for sending login requests
so after like 30-40 mins of work, i have 7 working accounts
*for those who have basic idea of security practices you can skip this part
lessons learnt
1) enable 2FA
2) use strong passwords, if you change your password , new password should be very different from the old one
there are several thousands of leaked plaintext passwords for services like netflix,spotify, hulu etc, are easily available using simple google search,
after looking through & analysing thousands of them you can find many common passwords , common patterns
they may not be as obvious as password ,password123 but they are easily guessable.
mainly this is because these type of entertainment services are used by the average joe, they dont care about strong passwords, 2FA etc6 -
Because I am very interested in cyber security and plan on doing my masters in it security I always try to stay up to date with the latest news and tools. However sometimes its a good idea to ask similar-minded people on how they approach these things, - and maybe I can learn a couple of things. So maybe people like @linuxxx have some advice :D Let's discuss :D
1) What's your goto OS? I currently use Antergos x64 and a Win10 Dualboot. Most likely you guys will recommend Linux, but if so what ditro, and why? I know that people like Snowden use QubesOS. What makes it much better then other distro? Would you use it for everyday tasks or is it overkill? What about Kali or Parrot-OS?
2) Your go-to privacy/security tools? Personally, I am always conencted to a VPN with openvpn (Killswitch on). In my browser (Firefox) I use UBlock and HttpsEverywhere. Used NoScript for a while but had more trouble then actual use with it (blocked too much). Search engine is DDG. All of my data is stored in VeraCrypt containers, so even if the system is compromised nobody is able to access any private data. Passwords are stored in KeePass. What other tools would you recommend?
3) What websites are you browsing for competent news reports in the it security scene? What websites can you recommend to find academic writeups/white papers about certain topics?
4) Google. Yeah a hate-love relationship, but its hard to completely avoid it. I do actually have a Google-Home device (dont kill me), which I use for calender entries, timers, alarms, reminders, and weather updates as well as IOT stuff such as turning my LED lights on and off. I wouldn"t mind switching to an open source solution which is equally good, however so far I couldnt find anything that would a good option. Suggestions?
5) What actions do you take to secure your phone and prevent things such as being tracked/spyed? Personally so far I havent really done much except for installing AdAway on my rooted device aswell as the same Firefox plugins I use on my desktop PC.
6) Are there ways to create mirror images of my entire linux system? Every now and then stuff breaks, that is tedious to fix and reinstalling the system takes a couple of hours. I remember from Windows that software such as Acronis or Paragon can create a full image of your system that you can backup and restore at any point to get a stable, healthy system back (without the need to install everything by hand).
7) Would you encrypt the boot partition of your system, even tho all data is already stored in encrypted containers?
8) Any other advice you can give :P ?12 -
Working at a local seo sweat-shop as "whatever the lead dev does't feel like doing" guy.
Inherit their linux "server".
- Over 500 security updates
- Everything in /var/www is chmod to 777
- Everything in /var/www is owned by a random user that isn't apache
- Every single database is owned by root sql user
- Password for sudo user and mysql root user same as wifi password given to everyone at company.
- Custom spaghetti code dashboard with over 400 files in one directory, db/ api logins spread throughout these files, passwords in plain text.
- Dashboard doesn't have passwords, just usernames to login
- Dashboard database has all customer information including credit card stored in plain text
- Company wifi is shared by other businesses in the area
I suggest that I should try to fix some of these things.
Lead Developer / Tech Director : We're an SEO company, not a security company . . .7 -
Screw all the people who think standard email is "secure". It is not suitible for sending passwords and SSN numbers.
How can something Equifax or Marriott hacks have happened and people are still ok sending out information like this in plain text?!
I know their hacks weren't email released but still.....should be a good time to up some security standards. Right?2 -
I really don't understand this particular Government Department's IT Unit. They have a system and network to maintain except:
- They don't have a DBA
- They don't have a dedicated Network Engineer or Security Staff
- Zero documentation on all of the systems that they are taking care of (its all in each assigned particular staff's brain they said)
- Unsure and untested way of restoring a backup into a system
- Server passwords are too simple and only one person was holding this whole time and its to an Administrator account. No individual user account.
- System was developed by an in-house developer who is now retired and left very little documentation on its usage but nothing on how its setup.
But, the system has been up and operational for the past 20 years and no major issues whatsoever with the users using it. I mean its a super simple system setup from the looks of it.
1 App Server connected to 1 DB Server, to serve 20-30 users. But it contains millions of records (2GB worth of data dump). I'm trying to swing to them to get me on a part time work to fix these gaps.
God save them for another 20 years.3 -
This isn't something I've dealt with personally, but recently heard the story on the podcast and was pretty astounded:
"A company who makes add-ons for Flight Simulator X included malware in one of their downloadable jets, players have alleged. The malicious file is called ‘test.exe’ and it is designed to extract passwords from the Chrome web browser."
Now that's some extreme DRM. "Pirate our downloadable jet? We leak your credit card information and Social Security Number to the darknet."
Original story: https://rockpapershotgun.com/2018/...3 -
We just had the introduction lesson about Emails. I think our teacher had fun sending fake mails from his computer over the server under our name.2
-
Opens the source code for an app I have to integrate with.
Finds: if($cryptPW == $dbPW)
What the shit?!?!!!!!
Learn to hash! Far out 😢4 -
“This value must be shorter than 20 characters in length.” … password field, bank website, 2016, wtf ¯\_(ツ)_/¯2
-
People, even on devrant, are complaining about having to change their Twitter passwords. A major security event is not the only occasion to change your password (for anything).
You should change your passwords for everything regularly. Like, once every month or two.
This is why password managers are brilliant.3 -
Not only is the default password they set a piece of shit, the password field actually shows the password even after you save it, why even bother with security?
Hash your fucking passwords!
The internet kills my insides.
4 -
Have any of you noticed how bad the new Google login page is? They invented reCAPTCHA, yet they use the old one. Considering how easy it is to make a mistake in the captcha and have to retype the password, people could start making shorter passwords (<16 characters) and seriously lower the security level of their accounts.4
-
Fun fact: If you ever want to see the password you are typing or view the contents of a password field in a form, just pull up the web inspector. You can change the input type from "password" to "text" with no ill effects upon submission.
The lesson? When populating password fields, put junk values in there instead. Will present the right appearance, and doesn't risk exposing something that should be stored as a salted hash anyway.3 -
When a banks mobile app, shows the exact number of characters required to login.
Not a blank space, or similar.
Even if the allowed password is within a range, it still shows the exact number of characters.
Correct me if i am wrong but this shouldn't be like this? -
I recently went to an office to open up a demat account
Manager: so your login and password will be sent to you and then once you login you'll be prompted to change the password
Me: *that's a good idea except that you're sending me the password which could be intercepted* ok
Manager: you'll also be asked to set a security question...
Me: *good step*
Manager: ...which you'll need to answer every time you want to login
Me: *lol what? Maybe that's good but kinda seems unnecessary. Instead you guys could have added two factor authentication* cool
Manager: after every month you'll have to change your password
Me : *nice* that's good
Manager: so what you can do change the password to something and then change it back to what it was. Also to remember it keep it something on your number or some date
Me: what? But why? If you suggest users to change it back to what it was then what is the point of making them change the password in the first place?
Manager: it's so that you don't have to remember so many different passwords
Me: but you don't even need to remember passwords, you can just use softwares like Kaspersky key manager where you can generate a password and use it. Also it's a bad practice if you suggest people who come here to open an account with such methods.
Manager: nothing happens, I'm myself doing that since past several years.
Me: *what a fucking buffoon* no, sir. Trust me that way it gets much easier to get access to your system/account. Also you shouldn't keep your passwords written down like that (there were some password written down on their whiteboard)
Manager: ....ok...so yeah you need sign on these papers and you'll be done
Me:(looking at his face...) Umm..ok4 -
People who use weak passwords are the digital equivalent to anti-vaxxers. Not only are they putting themselves at risk, but they can effect everyone else who has a lick of common sense.2
-
<<prev. #wk235 advices>>
~ Study the Error log deeply, Google each line if needed. Don't give up.
~ Learn by doing. Don't just read/watch.
~ Practice breaking down the problem statement first in different components and hierarchies. Don't jump into coding right away.
~ Write some, review some. Don't put off review for later.
~ Even if you don't exactly follow the best security practices - always ensure that your program is safe for use. Especially for user-inputs, etc, pay attention.
~ Never distribute code with passwords/keys written in it.
~ Don't hard code stuff, use Config file, environment variables, etc.
~ Try to automate repetitive stuff like build and deploy etc
~ Save and backup you code.
~ No one knows everything, also, today's knowledge gets outdated tomorrow. Continuous learning is synonymous with this field.
<<next #wk235 advices>>1 -
Hi everyone,
One question is constantly popping in my head and I keep fighting to figure out how to answer.
So here it is:
Are you for or agains a password manager to store all your passwords?
P.S.
I am using a paid password manager, but keep asking myself is it really worth it, and am I compromising all my passwords if someone is willing to spend some time and hack my vaults. On the other hand the convenience and benefit of having all passwords in one place and also using different strong passwords for each of my accounts protects me from a weak security implementation on any third party service I use, because I am not re-using the same password everywhere.12 -
This is not a rant. Not really. It's more expressing my own insecurity with a certain topic, which somehow upsets me sometimes (the insecurity, not the topic though).
I have nearly no knowledge about security/privacy stuff. I mean, yeah, I know how to choose secure passwords and don't make stupid DAU mistakes. The very basics you would expect someone to have after a CS bachelor's degree.
But other than that... Nothing. And I would like to get a bit into that stuff, but I have no clue where to start. First getting my head wrapped around low-level stuff like network layers? Or something completely else.
This topic is so intimidating to me as it seems huge, I have no idea where to start, and I feel that if you don't have "full" knowledge, you are going to make mistakes which you might not even notice.
I sometimes get really scared about having an account hijacked or similar. Also in our job it seems to become more and more of a topic we should know about.
Anybody got any advice?
I am looking for a way to improve my knowledge in security in general for professional reasons and my knowledge about privacy for private reasons.
It's just, every time I start reading something related it seems that I am lacking some other knowledge etc...10 -
!rant
Many out there say you should use 2 factor authentication with everything, but personally i feel lile that would just turn your phone into a sigle point of failure.
Phisical security is my primary worry, because loosing your phone or having it stolen yould pretty much lock you out of all your accounts.
Another thing is i don't know as much about android security, and i wouldn't be confortable managing it.
I have 2FA active for some key services, but imho a strong password is usually enough. I think its far more more importat for your overall security to avoid passwords re-use.
What do you think? Do you have 2FA on all the time?9 -
My facebook password is so secure...I made it so complex to the degree that I couldn't recall anymore!!😂
Thx God my phone is still logged in !5 -
Logs in to client office 365.
Big recommendation at the top
"Disable password auto expiry, it's currently set to 90 days"
Why is this a recommendation? I suppose there's an argument that making a user change every now and again will weaken their passwords over time, but really?2 -
Why am I incapable of studying human languages that I can use to communicate with people I genuinely want to talk to, but will use all of my spare time to learn a new computer language that I’ll never use!?1
-
One of our clients old CMS was completely hand written, allowed execution of PHP files in the uploads directory with an uploader that was publicly accessible, and the "security" was MD5 hashed passwords. Oh and the username/password for the admin user was password.
-
JetBlue still storing passwords in plain text, after 4 years
“JetBlue: The deadly sin of an otherwise great airline” https://medium.com/@sethillgard/...13 -
Best Cryptocurrency Recovery Company - Go to OMEGA CRYPTO RECOVERY SPECIALIST
OMEGA CRYPTO RECOVERY SPECIALIST is a reputable entity that offers top-quality services for cryptocurrency recovery, providing a lifeline to individuals who have fallen victim to theft or other mishaps in the digital currency realm.
Their expertise extends to accessing funds that are inaccessible due to security issues and employing advanced techniques for retrieving lost passwords, making them a reliable choice for those in need of assistance.
Webpage; omegarecoveryspecialist .c o m8 -
I've been wondering about renting a new VPS to get all my websites sorted out again. I am tired of shared hosting and I am able to manage it as I've been in the past.
With so many great people here, I was trying to put together some of the best practices and resources on how to handle the setup and configuration of a new machine, and I hope this post may help someone while trying to gather the best know-how in the comments. Don't be scared by the lengthy post, please.
The following tips are mainly from @Condor, @Noob, @Linuxxx and some other were gathered in the webz. Thanks for @Linux for recommending me Vultr VPS. I would appreciate further feedback from the community on how to improve this and/or change anything that may seem incorrect or should be done in better way.
1. Clean install CentOS 7 or Ubuntu (I am used to both, do you recommend more? Why?)
2. Install existing updates
3. Disable root login
4. Disable password for ssh
5. RSA key login with strong passwords/passphrases
6. Set correct locale and correct timezone (if different from default)
7. Close all ports
8. Disable and delete unneeded services
9. Install CSF
10. Install knockd (is it worth it at all? Isn't it security through obscurity?)
11. Install Fail2Ban (worth to install side by side with CSF? If not, why?)
12. Install ufw firewall (or keep with CSF/Fail2Ban? Why?)
13. Install rkhunter
14. Install anti-rootkit software (side by side with rkhunter?) (SELinux or AppArmor? Why?)
15. Enable Nginx/CSF rate limiting against SYN attacks
16. For a server to be public, is an IDS / IPS recommended? If so, which and why?
17. Log Injection Attacks in Application Layer - I should keep an eye on them. Is there any tool to help scanning?
If I want to have a server that serves multiple websites, would you add/change anything to the following?
18. Install Docker and manage separate instances with a Dockerfile powered base image with the following? Or should I keep all the servers in one main installation?
19. Install Nginx
20. Install PHP-FPM
21. Install PHP7
22. Install Memcached
23. Install MariaDB
24. Install phpMyAdmin (On specific port? Any recommendations here?)
I am sorry if this is somewhat lengthy, but I hope it may get better and be a good starting guide for a new server setup (eventually become a repo). Feel free to contribute in the comments.24 -
A while back I was looking for a new job and was given an interview by one company who shall remain nameless. Before the interview, they asked me look through their current site, nothing unusual there, so I started browsing. Then I received an email with all the details I needed to access their production server. Apparently they wanted me to look through the code, unusual but I did so.
First thing all the passwords, including those belonging to members of the public were stored in plain text and many were still the default passwords which were based on the Id so were sequential.
I highlighted these issues at the interview and they then asked me to do a test, not the usual test though, they asked me to add some charts to their prod site. Needless to say that didn’t happen and I got another job elsewhere.1 -
can someone explain to me why some people think having a password with a maximum size of 14 is good enough and then have the audacity to force it onto users?!2
-
Max password length of 100 😍
That ideally could take 353,108,814,528,039,200 QUINQUAGINTILLION YEARS to guess.
3 -
Lately, I've been working in a web security company (mainly as a Support guy).
Going through tickets, I've found one golden gem, which helped me realising how dum customers are.
Since he's our customer, we try to keep stuff up-and-running at all times. If something goes bad, we fix it, and we need their passwords for stuff.
After the customer (somehow) got hacked again, he changed the password in panic.
Note the initial password was really, really good.
He emailed us the new password for "just in case".
The password is "hard-to-guess".
What. The. Actuall. Fuck.
What's next?
Setting the password "12345", activating 2-step-authentication and sending his phone in, along with his finger so we can unlock it with touch id?2 -
In college, during Novell's heyday, I was working on my Certified Network Administrator certification (totally worthless, in retrospect). As I was becoming an expert in all things Novell, I found a security flaw. Using Visual Basic it was possible to code up an exact replica of the Novell login screen that launched at boot time from a batch file stored on a floppy. You could log peoples' usernames and passwords all day as long as they didn't realize your floppy was in the drive, which worked in certain computer lab setups on campus. I wasn't in it for stealing info or being a criminal. I just did it for the lulz. But if I had gained access to a few of the right computers in admin offices on campus, I could've gotten access to anyone's student profiles and grades.
-
So, I’ve been given the task of sorting the security out in an application plugging the holes and whatnot as to be honest it’s shocking haha. It doesn’t help that we automate security audits but that’s a different rant for another day.
We’re using devise for authentication (rails standard, ♥️ devise), we have no password resets through the login page, it has to be manually reset by ringing support, why who knows, even though it’s built into the gem and we allow the user to login using an username instead of an email because for whatever reason someone thought it was a bright idea to not have the email field mandatory.
So I hop onto a call with the BAs, basically I go that we need to implement password resets into the login page so the user can do it themselves and also to cut down support calls a ticket is already in place for it. So I go through the standardised workflow for resetting a password. My manager goes.
“I don’t think this will be very secure”
Wait.. what. Have you never reset a password before? It’s following the same protocol as every other app.
We go back and fourth and I said I’ll get it checked with security just to keep him happy.
The issue mainly is well we can’t implement password resets due to 100s of users not having an email on there account.. 🙃 so before we push this change we need to try and notice all users to set a unique email.
Updated the tickets. All dandy.
Looking at the PRs to see what security things have been done if any and turns out one of the devs in India has just written a migration to add the same default email to every user that doesn’t have an email present and yep it got merged. So I go revert the change but talk about taking a “we don’t care about security approach”.
Eventually we want to have the user reset their passwords and login using their email and someone goes a head and does that. Not to mention the security risk.
Jesus Christ I wonder why I bother sometimes.2 -
I hate having too much security, on the user side. I have 2 step verification on anything that allows and also most of my passwords are up to a limit, seriously. This is why I have LastPass but obviously no work I ever been in allowed it. Except Freelancing and my own software / apps.
-
Security issues I encountered:
- Passwords stored as plain text until last year.
- Sensitive data over http until last year.
- Webservice without user/pass authentication. -
I’m working on a new app I’m pretty excited about.
I’m taking a slightly novel (maybe 🥲) approach to an offline password manager. I’m not saying that online password managers are unreliable, I’m just saying the idea of giving a corporation all of my passwords gives me goosebumps.
Originally, I was going to make a simple “file encrypted via password” sort of thing just to get the job done. But I’ve decided to put some elbow grease into it, actually.
The elephant in the room is what happens if you forget your password? If you use the password as the encryption key, you’re boned. Nothing you can do except set up a brute-forcer and hope your CPU is stronger than your password was.
Not to mention, if you want to change your password, the entire data file will need to be re-encrypted. Not a bad thing in reality, but definitely kinda annoying.
So actually, I came up with a design that allows you to use security questions in addition to a password.
But as I was trying to come up with “good” security questions, I realized there is virtually no such thing. 99% of security question answers are one or two words long and come from data sets that have relatively small pools of answers. The name of your first crush? That’s easy, just try every common name in your country. Same thing with pet names. Ice cream flavors. Favorite fruits. Childhood cartoons. These all have data sets in the thousands at most. An old XP machine could run through all the permutations over lunch.
So instead I’ve come up with these ideas. In order from least good to most good:
1) [thinking to remove this] You can remove the question from the security question. It’s your responsibility to remember it and it displays only as “Question #1”. Maybe you can write it down or something.
2) there are 5 questions and you need to get 4 of them right. This does increase the possible permutations, but still does little against questions with simple answers. Plus, it could almost be easier to remember your password at this point.
All this made me think “why try to fix a broken system when you can improve a working system”
So instead,
3) I’ve branded my passwords as “passphrases” instead. This is because instead of a single, short, complex word, my program encourages entire sentences. Since the ability to brute force a password decreases exponentially as length increases, and it is easier to remember a phrase rather than a complicated amalgamation or letters number and symbols, a passphrase should be preferred. Sprinkling in the occasional symbol to prevent dictionary attacks will make them totally uncrackable.
In addition? You can have an unlimited number of passphrases. Forgot one? No biggie. Use your backup passphrases, then remind yourself what your original passphrase was after you log in.
All this accomplished on a system that runs entirely locally is, in my opinion, interesting. Probably it has been done before, and almost certainly it has been done better than what I will be able to make, but I’m happy I was able to think up a design I am proud of.8 -
Why does #Devrant (idk if #'s are a thing here) not have a confirm password field?
Come on... I doubt it annoys users and it saves people a lot of hassle, especially when we are logging in on multiple devices :/ I know lots of people who type their password wrong the first time and later on they can't login and get frustrated and confused then end up resetting via email.
Also why no login with Google etc~ that's kinda annoying too...3 -
!rant
This is fucking how you do it!
Ticketmaster UK had a "data security incident" where they don't really know if any data was actually leaked/stolen/"accessed by an unknown third-party" — their response:
1. Disable the compromised service across their platforms
2. Send a mail to any customer that may have been affected (I got one in Danish because I had only interacted with them through a Danish subsidiary)
2b. All notified customers have their passwords reset and must go through the "Forgot password" process; the _temporary_ password they sent me was even pretty nicely random looking: ";~e&+oVX1RQOA`BNe4"
3. Do forensics and security reviews to understand how the data was compromised
3b. Take contact to relevant authorities, credit card companies, and banks
4. Establish a dedicated website (https://security.ticketmaster.co.uk/...) to explain the incident and answer customer questions
5. "We are offering impacted customers a free 12 month identity monitoring service with a leading provider. To request this service please visit [this page]"
EDIT: As mentioned and sourced in the first comment, the breach was apparently noticed by a banking provider and reported to Ticketmaster on the 12th of April and later to Mastercard on the 19th of April.
Ticketmaster's internal investigation found no evidence of breach (which makes sense, as it wasn't an internal breach), but when Mastercard issued an alert to banks about it on the 21st of June, Ticketmaster followed up by finding the actual breach and disabling the breached third party service on the 23rd of June.
I still think they did the right thing in the right way...2 -
The NPC has stated that the personal data of atleast 2000 people was leaked after the attacks on the websites of the philippinian goverment on april 1, the data contains; names,adresses,passwords and school data.
Over 7 administrators of schools, universities and other goverment structures have been called out for not reporting on the leakage of personal info on public facebook groups and violaton of the NPC in under 72 hours.
The representatives of the next structures stood before the comission on the 23 and 24 of april
- Taguig City University
- Department of Education offices in Bacoor City and Calamba City
- the Province of Bulacan
- Philippine Carabao Center
- Republic Central Colleges in Angeles City
- Laguna State Polytechnic University
The agency has reported that none of the organisations had notified about the personal info leakage yet.
This is a good reminder that you should inform about security/personal info breaches everyone that might be related to it as soon as possible, even if it seems unecessary. -
Hey guys.
So, where do you guys store your passwords?
It's getting hard to keep track of so many logins and passwords now that I have the time to learn, try new stuff, meddle with VPS and shit and I can't keep track of everything.
Ps: must save somewhere online (or at least backups) and be multi platform (windows + Linux + Android9 -
You know what really grinds my gears? Products that have no right of linking your data to an online platform.
Case and point: Password Managers. Nearly all of them work only with an account on a given service, have the passwords stored on their servers and so on and so forth. There is 0 transparency and for that matter 0 security. I found my choice, though it infuriates me terribly.
Another thing are budget managers. The switch for YNAB from local to on servers really annoys me. They should have no business in storing my very private data on their server. I don't understand people using it either.1 -
Anybody know of any enterprise software for password storage and sharing?
We have an issue where multiple people across different teams use the same accounts and need them to be able to access certain login information but not all login information.
I’m hoping for something free/open source but at this point I’m open to anything. Must have the ability to give users privileges.7 -
Company automatically disables your employee login passwords after every 45 days, which is a good practice for ensuring security. However I get no notifications that my password is being disabled. The result, for the past 4 months, I've been going to IT support requesting them to let me change my password on their admin console because I forgot to change it 'once again'. Sigh.. :/2
-
"combination of upper and lower case letters, numbers and symbols"
Someone please change the devrant terms to encourage more secure passwords...
(Yes, I actually read* the terms and conditions)
* half of
7 -
Approx. 24 hours ago I proceeded to use MEGA NZ to download a file It's something I've done before. I have an account with them.
This is part of the email I received from MEGA NZ following the dowload: "
zemenwambuis2015@gmail.com
YOUR MEGA ACCOUNT HAS BEEN LOCKED FOR YOUR SAFETY; WE SUSPECT THAT YOU ARE USING THE SAME PASSWORD FOR YOUR MEGA ACCOUNT AS FOR OTHER SERVICES, AND THAT AT LEAST ONE OF THESE OTHER SERVICES HAS SUFFERED A DATA BREACH.
While MEGA remains secure, many big players have suffered a data breach (e.g. yahoo.com, dropbox.com, linkedin.com, adobe.com, myspace.com, tumblr.com, last.fm, snapchat.com, ashleymadison.com - check haveibeenpwned.com/PwnedWebsites for details), exposing millions of users who have used the same password on multiple services to credential stuffers (https://en.wikipedia.org/wiki/...). Your password leaked and is now being used by bad actors to log into your accounts, including, but not limited to, your MEGA account.
To unlock your MEGA account, please follow the link below. You will be required to change your account password - please use a strong password that you have not used anywhere else. We also recommend you change the passwords you have used on other services to strong, unique passwords. Do not ever reuse a password.
Verify my email
Didn’t work? Copy the link below into your web browser:
https://mega.nz//...
To prevent this from happening in the future, use a strong and unique password. Please also make sure you do not lose your password, otherwise you will lose access to your data; MEGA strongly recommends the use of a password manager. For more info on best security practices see: https://mega.nz/security
Best regards,
— Team MEGA
Mega Limited 2020."
Who in their right mind is going to believe something like that that's worded so poorly.
Can anybody shed some light on this latest bit of MEGA's fuckery?
Thank you very much.4 -
Someone earlier today posted a rant about a credit card security conference sending them account details with a plain text password in an email. The password appeared to be 1 use temporary password that the user would change on first login. Assuming one does not actually store plain text passwords, what is the downside to a single use password Vs a single use link to set a new password?1
-
I believed the only thing that could humble me was leg day. Guess clicking a shady update link can humble you quicker than a botched deadlift. I had developed my app from the ground up, and that Bitcoin reserve was meant to fuel our international expansion. One minute I was meal-prepping protein pancakes; the next, my wallet was thinner than my fridge on cheat day.
My pulse raced as though I was half-burpee. Panic. Sweating. Guilt. I refreshed the page like cardio, praying the money would somehow reappear. Spoiler: It didn't.
After a long night Googling “how to undo catastrophic life mistakes,” I landed on a cybersecurity webinar. The host casually dropped the name Mighty Hacker Recovery like it was common knowledge. To me, they sounded like the Gandalf of Bitcoin, so I figured they could probably handle my little meltdown.
I reached out to them in a panic, the equivalent of a person who's just discovered they double-booked leg day and pizza night. They responded quicker than my personal best sprint time. They were cool, they were professional, and, most importantly, they didn't laugh when I described how I basically bench-pressed my life savings directly into nothingness.
They got to work immediately. Their team of tech wizards (I’m convinced they actually wear robes) dissected the malware and traced the funds like a GPS tracker on my dignity. Every day, they updated me with progress reports that somehow balanced technical jargon and emotional support, the digital equivalent of a personal trainer shouting, “You got this!” while you struggle under a barbell.
Nine days later, I got the call. Funds recovered. I nearly did a victory lap around my living room but pulled a hamstring from pure excitement. Typical. Due to Mighty Hacker Recovery, I didn't simply get my money back; I got a crash course in cybersecurity that rivals my toughest boot camp. My new digital security routine now rivals my meal plan. I have more passwords than protein shake recipes and back-ups on top of other back-ups.
If you value your gains, both financial and physical, trust me, you want Mighty Hacker Recovery in your corner. They spot you when it matters most. What$app Numb3r + 1 4 0 4 2 4 5 6 4 1 5 email support (at) mightyhackerrecovery (dot) com2 -
HOW TO RECOVER YOUR STOLEN BITCOIN WITH WEB BAILIFF CONTRACTOR
Life is ridiculously amusing. I was waiting in line for my morning coffee one minute and was witness to a barista extolling the virtues of Web Bailiff Contractor as if they were superheroes in the real world.
I chuckled it away at the time. I figured that I would never require any such crypto recovery services. My wallet was secure, my security was on solid foundations-or so I believed.
All that ended a week afterwards. I was going to send some Bitcoin when, all of a sudden, my wallet rejected my credentials. Wrong password.
I tried again. And again. Panic set in.
My $330,000 was trapped, and for the life of me, I could not recall the password. I was certain I had it correct, but the wallet disagreed. That is when I recalled the barista's glowing recommendation of Web Bailiff Contractor; in a state of desperation, I searched for them and chose to contact them. From the initial message, their staff was patient, friendly, and very professional, and I felt confident that I wasn't the first-let alone the last-man in the world who lost access to his wallet due to a forgotten password. They were that confident that they reassured me, but I just could not help myself: I worried. Was my Bitcoin lost forever? No chance. Their technicians worked through several complicated decryption techniques over the course of the next few days to decrypt my lost password. They worked through the security levels, attempted all manner of likely variations, and-amazingly-got me logged back on. I felt like I'd won the lottery when I was presented with my balance again. I must have sounded exactly like that barista, praising the merits of Web Bailiff Contractor to anyone who would hear me, because the relief was total. Not only did they restore my funds, but they provided me with sensible advice regarding password management, locking down my crypto, and how to steer clear of such calamities in the future. To this day, whenever I walk by that coffee shop, I always leave a generous tip—just because, if it weren't for that chat, I might still have been shut out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever get locked out of your crypto, Web Bailiff Contractor is the one to contact. -
REACH OUT TO TECH CYBER FORCE RECOVERY FOR A GREAT JOB
WhatsApp +15617263697
Fine wine and crypto do not always blend well, especially after a few drinks. I learned this the hard way after a record harvest at my vineyard. Swirling an old Cabernet under the stars, I was a financial connoisseur, my $720,000 Bitcoin wallet aging well for future returns. But the next morning, with a hangover as intense as my Merlion, I realized I'd forgotten my wallet password. Even worse, my recovery phrase, which I'd written down in my wine cellar notebook, had vanished.
My eager new assistant had tidied up, mistaking my scribbled security notes for wine tasting spillage, and donated the entire book to the recycling gods. I dove into the garbage cans like a desperate sommelier searching for a quality grape but came up with broken dreams and soggy cardboard.
Panic set in faster than cork taint. I faced the bitter truth: my digital fortune was bottled up tighter than a corked bottle with no opener. I sank into denial, questioning whether my future vineyard expansion would now be reduced to selling boxed wine.
I panicked, pored over industry publications, and came across a wine industry newsletter that mentioned Tech Cyber Force Recovery. Their slogan, something playful about "decanting lost crypto," seemed like a sign from God.
I contacted them, half-expecting snobbery or skepticism. What I received instead were tech wizards who tackled my case with humor and precision. Their team labored over my case like veteran sommeliers dissecting terroir. They painstakingly reconstructed transaction flows, timestamp records, and subtle wallet behavior. It was as if I was watching wine connoisseurs sniff out hints of blackcurrant and oak, but with algorithms and blockchain forensics.
Each day, they provided updates with the finesse of tasting notes. “We’re detecting progress, notes of potential access, hints of password recovery on the finish.” Their creativity lightened my anxiety, and ten days later, they uncorked my digital vault.
When I saw my Bitcoin balance restored, I nearly opened a bottle of my best vintage at 9 AM. My assistant and I shared a hearty laugh; he's still working for me, but now he labels my ledgers with "DO NOT TOUCH" in bold.
My wine business is thriving thanks to Tech Cyber Force Recovery, and I have a new rule: passwords before Pinot. Cheers to their genius!1 -
HOW TO SECURE AND RECOVER YOUR STOLEN CRYPTOCURRENCY/ CONSULT TRUST GEEKS HACK EXPERT
( E m a i l : in fo @ trust geeks hack expert . c o m)
(Te le G r a m:: Trust geeks hack expert)
(w h a t's A p p +1 7 1 9 4 9 2 2 6 9 3)
(E m a i l: Trust geeks hack expert @ f a s t se r v i c e .c o m )
Over five years ago, I lost access to two of my crypto wallets, which I hadn’t used in years. These wallets contained valuable crypto assets, but I had completely forgotten the passwords, recovery phrases, and security questions. After trying everything I could think of to regain access, I was left feeling hopeless, thinking my assets were gone forever. That’s when I came across ( Trust Geeks Hack Expert ), and I can honestly say they changed the course of my life. Initially, I was skeptical. The idea of recovering forgotten crypto wallets seemed almost impossible. However, from the first moment I contacted the team, I felt a sense of hope. The staff was incredibly professional, empathetic, and genuinely dedicated to helping me recover my wallets. They took the time to fully understand my situation, offering clear explanations and reassuring me that they could assist. The recovery process wasn’t immediate, but it was methodical and thorough. The team worked diligently, guiding me through every step of the process and explaining things in a way I could easily understand. At times, I felt frustrated, especially given how long it had been since I last used the wallets. But the ( Trust Geeks Hack Expert ) team remained patient, offering constant support, and helping me stay focused on the end goal. They made sure I felt secure throughout the entire process, which provided me with the confidence I needed to continue. Finally, after several weeks of hard work, I regained access to my wallets. It was an overwhelming and life-changing moment. Not only did I recover my crypto assets, but I also felt an immense sense of relief and accomplishment. What I thought was lost forever was now back in my hands. Thanks to the ( Trust Geeks Hack Expert ) team, I’m incredibly thankful for ( Trust Geeks Hack Expert ) expertise and dedication.2 -
Sometimes life gives you signs-you just gotta be paying attention. One night, deep in an Uber ride, I struck up a conversation with the driver. The topic of Bitcoin came up, and he mentioned that he once lost his wallet containing $50,000.
I thought this would be the end of the story-something like regret, lessons learned, and moving on. But then he said something that stuck with me: "Thankfully, I found WIZARD WEB RECOVERY SERVICES . They got everything back." I nodded, really interested but unconcerned. After all, I was very careful with my wallet security. I thought, That's rough, but it could never happen to me. A week later, it happened to me. I lost the wallet holding $300,000 while overhauling my crypto storage system. In one wrong move, my funds became completely unreachable. I retraced passwords, checked backups, tried everything that normally works, but nothing worked. Panic kicked in. My mind was racing, trying to figure out my next move. And then, I remembered the Uber driver's story.
I didn't waste a moment and contacted WIZARD WEB RECOVERY SERVICES . Right upon connecting to their team, I could feel my nerves calm down. They did not right away get to work but also asked questions, analyzed my situation, and explained how the recovery would go. It was next-level professionalism; they didn't just work on how to return my money but also how to make me understand what happened and how I could avoid it in the future. Finally, after what felt like the longest wait of my life, came the message that I had been waiting for: My wallet was recovered successfully.
Relief doesn't even begin to describe my feeling at that moment. That $300,000 wasn't just money; it was years of careful investments and strategic planning. And in an instant, it was all back where it belonged. In retrospect, I owe more than a five-star rating to that Uber driver. His story gave me a lifeline which I didn't know I needed. Lesson learned: Pay attention to those random conversations-you never know when they might save you a fortune.1 -
Sometimes life gives you signs-you just got to be paying attention. One night, deep in an Uber ride, I struck up a conversation with the driver. The topic of Bitcoin came up, and he mentioned that he once lost his wallet containing $50,000.
I thought this would be the end of the story-something like regret, lessons learned, and moving on. But then he said something that stuck with me: "Thankfully, I found Lee Ultimate Hacker. They got everything back." I nodded, really interested but unconcerned. After all, I was so very careful with my wallet security. I thought, That's rough, but it could never happen to me. A week later, it happened to me. I lost the wallet holding $300,000 while overhauling my crypto storage system. In one wrong move, my funds became completely unreachable. I retraced passwords, checked backups, tried everything that normally works, but nothing worked. Panic kicked in. My mind was racing, trying to figure out my next move. And then, I remembered the Uber driver's story.
I didn't waste a moment and contacted Lee Ultimate Hacker. Right upon connecting to their team, I could feel my nerves calm down. They did not right away get to work but also asked questions, analyzed my situation, and explained how the recovery would go. It was next-level professionalism; they didn't just work on how to return my money but also how to make me understand what happened and how I could avoid it in the future. Finally, after what felt like the longest wait of my life, came the message that I had been waiting for: My wallet was recovered successfully.
Relief doesn't even begin to describe my feeling at that moment. That $300,000 wasn't just money; it was years of careful investments and strategic planning. And in an instant, it was all back where it belonged. In retrospect, I owe more than a five-star rating to that Uber driver. His story gave me a lifeline which I didn't know I needed. Lesson learned: Pay attention to those random conversations-you never know when they might save you a fortune.
LEEULTIMATEHACKER @ AOL . COM
telegram: LEEULTIMATE
wh@tsapp +1 (715) 314 - 92483 -
The crypto market is flooded with web recovery solutions, each claiming to be the best thing since sliced bread. But how do you separate the wizards from the mere mortals? A comparative analysis of various web recovery solutions can help you make an informed decision. It's like conducting a thorough background check on potential roommates—except this time, it's your digital wealth that's at stake. Infinix Web Recovery is aware of how critical it is to stay one step ahead in the dynamic world of cryptocurrencies. Their platform has alarm and monitoring mechanisms that operate in real-time because of this. This enables you to respond quickly to safeguard your assets by identifying any unusual activity or possible threats. You won't have to worry about waking up to discover that your cryptocurrency holdings have vanished for no apparent reason. Credentials are no longer the only means of authentication. Infinix Web Recovery effective user authentication procedures raise the bar for security. You can be guaranteed that only authorized users have access to your cryptocurrency holdings thanks to features like multi-factor authentication and biometric verification. You can stop worrying about having weak passwords and becoming a target of phishing efforts. Infinix Web Recovery knows that your crypto assets are valuable and deserve the highest level of protection. That's why they employ advanced data encryption and secure storage methods. Your sensitive information is transformed into a secret code that's virtually impossible to crack. Rest easy knowing that even if someone gains access to your data, it will be completely useless to them. It's like keeping your crypto stash in a safe within a safe. Crypto asset management is an ongoing process, and so is utilizing Infinix Web Recovery . It's important to regularly update and review your recovery settings to keep up with the ever-changing crypto landscape. Stay proactive and ensure your recovery protocols are up to par, so you can always be one step ahead of potential threats. In the world of cryptocurrencies, where threats and risks lurk in the shadows, it's crucial to have a powerful ally like Infinix Web Recovery . With their real-time monitoring, efficient authentication processes, and secure storage, you can rest easy knowing your assets are protected. The success stories of Jane and John showcase the remarkable capabilities of Infinix Web Recovery in recovering lost funds and preventing hacks. Contact Infinix Web Recovery2
-
FACING DIFFICULTIES RECOVERING YOUR BITCOINS? CONSULT ADRIAN LAMO HACKER
Navigating life as a divorced parent with two children is undeniably challenging, especially when it comes to financial stability. As a high school teacher, I found myself in a constant struggle to make ends meet, prompting me to seek additional income streams without compromising my teaching job. That's when I turned to cryptocurrency trading, seeing it as a promising avenue to supplement my earnings. After six months of diligent learning and practicing with a demo account, I felt confident enough to dive into live trading. Excited by the potential for financial growth, I decided to invest my life savings of $150,000, along with taking out a mortgage on my house, viewing it as a strategic investment in trading Bitcoin. Initially, my efforts seemed fruitful as I quickly amassed a profit of $10,000 within the first few weeks. However, my newfound success was short-lived when I received a malicious email from an unknown sender, enticing me to invest on their behalf. Little did I know, it was a phishing scam designed to steal my personal information. In a cruel twist of fate, I lost access to my email account and all associated login details, including passwords to my cryptocurrency wallets. Panic and despair consumed me as I realized the extent of the deception. My hard-earned money and financial security were now in jeopardy, leaving me feeling helpless and vulnerable. In my darkest hour, a glimmer of hope emerged when I learned about ADRIAN LAMO HACKER through a trusted friend. Desperate for a solution, I reached out to them, hoping against hope that they could help me regain access to my lost funds and restore my peace of mind. ADRIAN LAMO HACKER's dedicated team of experts proved to be a lifeline in my time of need. With their unparalleled expertise and unwavering determination, they worked tirelessly to recover my stolen assets and restore access to my compromised accounts. Their thorough investigation uncovered crucial evidence, ultimately leading to the apprehension of the perpetrators responsible for the phishing scam. Through their invaluable assistance, I not only recovered my lost funds but also gained a newfound sense of security and confidence in navigating the digital landscape. The experience served as a poignant reminder of the importance of vigilance and caution when engaging in online activities, especially in the realm of cryptocurrency trading. In conclusion, my journey with ADRIAN LAMO HACKER was a testament to their unwavering commitment to assisting victims of digital scams. For anyone facing similar challenges, I wholeheartedly recommend ADRIAN LAMO HACKER as a trusted ally in reclaiming what rightfully belongs to them and restoring financial stability. Contact ADRIAN LAMO HACKER via the website: https : // adrianlamohackpro . online/
WhatsApp: +1 (909) 739‑0269 -
EFFECTIVE SOLUTIONS FOR RETRIEVING MISPLACED FUNDS AND RESTORQING YOUR FINANCIAL SECURITY
The story of Trust Geeks Hack Expert, which helped me recoup a staggering $63,000 worth of Bitcoin, serves as a powerful cautionary tale for anyone who has suffered the heartbreak of lost digital assets. While the initial promise of a miraculous recovery may have seemed like a lifeline, the reality is far more complex and nuanced. This experience underscores several key lessons for navigating the volatile and unpredictable world of cryptocurrency. First, it highlights the critical importance of robust security measures. Cryptocurrencies, by their very decentralized nature, offer both opportunities and risks. Unlike traditional financial systems, there is no central authority overseeing transactions, leaving users vulnerable to hacks, scams, and errors. The security of digital assets rests entirely in the hands of the user. Therefore, it is essential to implement strong security practices, such as using hardware wallets, enabling two-factor authentication, and creating complex passwords. Regularly updating security settings and verifying the authenticity of platforms before engaging with them can help safeguard assets from potential threats. My experience with Trust Geeks Hack Expert also serves as a stark reminder of the dangers of placing blind trust in unverified sources. this experience underscores the harsh realities of navigating the cryptocurrency ecosystem. While the decentralized nature of cryptocurrencies offers unparalleled freedom, it also places the burden of responsibility directly on the individual. Without the protection of a centralized system, users are at greater risk of losing their investments due to human error, malicious attacks, or fraud. The promise of easy profits often comes with significant risks, and it’s crucial to approach the crypto world with caution. Trust Geeks Hack Expert episode, which helped me reclaim my lost assets, highlights the need for comprehensive security practices, caution when dealing with unverified sources, and an awareness of the risks inherent in the cryptocurrency ecosystem. As digital assets continue to grow in prominence, these lessons will be essential for anyone looking to safely navigate the ever-evolving world of cryptocurrency. Reach out to Trust Geeks Hack Expert for their exceptional recovery service.
E m a i l . Info @ trustgeekshackexpert. com
Te le Gram. Trustgeekshackexpert
Email: Trust geeks hacke xpert @ fast service .. com1 -
HIGELY RECOMENDED CRYPTO WIZARD WEB RECOVERY SERVICES RECOVER YOUR FUNDS
One night, deep within one of those YouTube rabbit holes-you know, the ones where you progress from video to video until you already can't remember what you were searching for-well, I found myself stuck in crypto horror stories. I have watched people share how they lost access to their Bitcoin wallets, be it through hacks, forgotten passwords, glitches in software, or mislaid seed phrases. Some of the stupid mistakes made me laugh; others were devastating losses. At no point did I think I would be the next story. Literally the next morning, I tried to get to my wallet like usual, but found myself shut out. First, I assumed it was some sort of minor typo, but after multiple attempts-anything I could possibly do with the password-I realized that something had gone very wrong. $400,000 in Bitcoin was inside that wallet. I tried not to panic. Instead, I went back over my steps, checked my saved credentials, even restarted my device. Nothing worked. The laughter from last night's videos felt like a cruel joke now. This wasn't funny anymore. It was then that I remembered: One of the videos on YouTube spoke about WIZARD WEB RECOVERY SERVICES . It was some dude who lost his crypto in pretty similar circumstances. He swore on their expertise; I was out of options and reached out to them. From the very moment I contacted them, their staff was professional, patient, and very knowledgeable indeed. I told them my case, and then they just went ahead and introduced me to the plan. They reassured me that they have dealt with cases similar to this-and that I wasn't doomed as I felt. Over the course of a few days, they worked on meticulously analyzing all security layers around my wallet, checking for probable failure points, and reconstructing lost credentials with accuracy and expertise. Then came the call that changed everything: “Y didn’t just restore my wallet—they restored my sanity. I walked away from this exodus funds are safe. You’re back in.” I can’t even put into words the relief I felt at that moment. WIZARD WEB RECOVERY SERVICES patience with two important lessons:
1. Never, ever neglect a wallet backup.
2. If disaster strikes, WIZARD WEB RECOVERY SERVICES is the only name you need to remember.
If you're reading this and thinking, "That would never happen to me," I used to think the same thing. Until it did.
1 -
One night, deep within one of those YouTube rabbit holes-you know, the ones where you progress from video to video until you already can't remember what you were searching for-well, I found myself stuck in crypto horror stories. I have watched people share how they lost access to their Bitcoin wallets, be it through hacks, forgotten passwords, glitches in software, or mislaid seed phrases. Some of the stupid mistakes made me laugh; others were devastating losses. At no point did I think I would be the next story. Literally the next morning, I tried to get to my wallet like usual, but found myself shut out. First, I assumed it was some sort of minor typo, but after multiple attempts-anything I could possibly do with the password-I realized that something had gone very wrong. $400,000 in Bitcoin was inside that wallet. I tried not to panic. Instead, I went back over my steps, checked my saved credentials, even restarted my device. Nothing worked. The laughter from last night's videos felt like a cruel joke now. This wasn't funny anymore. It was then that I remembered: One of the videos on YouTube spoke about Cranix Ethical Solutions Haven. It was some dude who lost his crypto in pretty similar circumstances. He swore on their expertise; I was out of options and reached out to them. From the very moment I contacted them, their staff was professional, patient, and very knowledgeable indeed. I told them my case, and then they just went ahead and introduced me to the plan. They reassured me that they have dealt with cases similar to this-and that I wasn't doomed as I felt. Over the course of a few days, they worked on meticulously analyzing all security layers around my wallet, checking for probable failure points, and reconstructing lost credentials with accuracy and expertise. Then came the call that changed everything: “Your funds are safe. You’re back in.” I can’t even put into words the relief I felt at that moment. Cranix Ethical Solutions Haven didn’t just restore my wallet—they restored my sanity. I walked away from this experience with two important lessons:
1. Never, ever neglect a wallet backup.
2. If disaster strikes, Cranix Ethical Solutions Haven is the only name you need to remember.
If you're reading this and thinking, "That would never happen to me," I used to think the same thing. Until it did.
EMAIL: cranixethicalsolutionshaven at post dot com
WHATSAPP: +44 (7460) (622730)
TELEGRAM: @ cranixethicalsolutionshaven1 -
The Top Bitcoin Wallet Recovery Services in 2025
Cryptocurrency has revolutionized how we think about money, but losing access to your BTC wallet can be a nightmare. In 2025, several companies are stepping up to help individuals regain access to their wallets. Whether due to forgotten passwords, damaged devices, or other complications, these services provide reliable solutions for recovery.
1. Puran Crypto Recovery
Puran Crypto Recovery has emerged as the best Bitcoin wallet recovery company in 2025. Renowned for its cutting-edge tools and unmatched expertise, Puran Crypto Recovery specializes in recovering lost or inaccessible wallets while maintaining the highest standards of security. The company’s process is transparent, ensuring clients remain informed every step of the way. Their professional approach and high success rate make them the top choice for Bitcoin wallet recovery this year. You can reach them via email at purancryptorecovery(@)contactpuran(.)co(.)site or visit their website at puran.online.
Puran Crypto Recovery recovers lost crypto passwords since 2017. They support Bitcoin, Ethereum, Multibit, Trezor, and Metamask wallets. Their Wallet Recovery Service has been trusted by hundreds of clients worldwide, offering fast and secure solutions.
Puran Crypto Recovery stands out as a premier player in the industry, offering a range of services that have earned them a reputation for reliability and innovation. Here's a comprehensive review highlighting the key aspects that make Puran Crypto Recovery a standout choice:
Doxxed Owners: Transparency is crucial in any industry, and Puran Crypto Recovery excels in this aspect by having doxxed owners. This commitment to transparency instills trust and confidence among users, knowing that the people behind the company are accountable and accessible.
Conference Presence: Puran Crypto Recovery maintains a strong presence at industry conferences, demonstrating its commitment to staying updated with the latest trends and fostering networking opportunities. Their active participation in such events underscores their dedication to continuous improvement and staying ahead of the curve.
Media Coverage: With significant media coverage, Puran Crypto Recovery has garnered attention for its innovative solutions and contributions to the industry. Positive media coverage serves as a testament to the company's credibility and impact within the field.
Trustpilot Score: Puran Crypto Recovery boasts an impressive Trustpilot score, reflecting the satisfaction and trust of its user base. High ratings on platforms like Trustpilot indicate a track record of delivering quality services and customer satisfaction.
Google Ranking: A strong Google ranking speaks volumes about Puran Crypto Recovery's online presence and reputation. It signifies that the company is easily discoverable and recognized as a reputable entity within the industry.
Support Time Response: Puran Crypto Recovery prioritizes prompt and efficient support, ensuring that customer inquiries and issues are addressed in a timely manner. Quick response times demonstrate a commitment to customer satisfaction and effective problem resolution.
Incorporation Jurisdiction Score: Puran Crypto Recovery's choice of incorporation jurisdiction reflects careful consideration of legal and regulatory factors. This strategic decision underscores the company's commitment to compliance and operating within a secure and stable legal framework.
Community Activity: Active engagement in communities such as Bitcointalk, Hashcat, GitHub, and Reddit showcases Puran Crypto Recovery's dedication to fostering a vibrant and supportive ecosystem. Participation in these platforms enables the company to gather feedback, collaborate with enthusiasts, and contribute to the community's growth.
Social Media Presence: Puran Crypto Recovery maintains a strong presence across various social media platforms, including X and LinkedIn. Active engagement on social media not only enhances brand visibility but also facilitates direct communication with users and stakeholders.
Transparency and Accountability
Industry Leadership and Innovation
Exceptional Customer Satisfaction
Strong commitment to privacy and security
Legal Compliance and Stability
Educational resources available
Community Engagement and Collaboration
Currency
Supported wallets
Bitcoin, Ethereum, Multibit, Trezor, and MetaMask wallets.13 -
Setting up my dad's first Bitcoin wallet was supposed to go smoothly; instead, he had forgotten his password within days after the transfer of $95,000 into the new account. You know, like one of those laugh-out-loud, sort-of-awkward moments, you are thinking in the back of your mind how hard could that password really be to remember? Hard-especially when you're fresh in this crypto space and getting familiar with all kinds of security. I could almost hear the panic in his voice when Dad called me. He didn't know what to do: his money was locked in a wallet, and the password was apparently gone up in smoke. We didn't have any backup options or anything that would help jog his memory. I tried to help him, but every password I guessed made it worse. The reality hit hard: the $95,000 was sitting there, out of reach, and the clock was ticking. That's when I knew I needed to get professional help. That is when the PYRAMID HACK SOLUTION literally came into play. I was very skeptical at first-after all, how often does one have something such as this resolved, especially dealing with crypto? But the moment I explained the situation, the team showed great understanding and reassured me: no strangers to these kinds of problems, they got right down to cracking the code. What followed was a few tense days of waiting; every time I tried to reach out to PYRAMID HACK SOLUTION, they would keep me updated and put my mind at ease. The professionalism was unmatched, and before I knew it, they phoned with good news: my dad's Bitcoin wallet was unlocked, and the $95,000 was recovered. It was an overwhelming relief. My dad, who had been about ready to give up on crypto entirely, was now a proud Bitcoin holder once again. Thanks to PYRAMID HACK SOLUTION, Email; pyramidhack @ solution4u. com TELEGRAM; @ PyramidhackSolution he didn't just get his funds back-he got a crash course in cryptocurrency security, and now he's a confident pro in his own right. As for me, I'm no longer the tech failure I once feared I was. Now, whenever he is in trouble, I am his savior of technology. It was funny, really, looking back on how one little mistake could spiral into a big panic. But with PYRAMID HACK SOLUTION, we were able to make it a success story. A lesson learned for both of us: be more careful with the passwords, especially those that guard such valuable assets.2
-
GET BACK YOUR STOEN CRYPTO: REACH OUT TO FUNDS RECLAIMER COMPANY
Recovering Bitcoin from an old blockchain wallet can feel like a daunting task, especially if you’ve forgotten the password or lost access for several years. I experienced this firsthand with a wallet I thought was lost forever. For years, I tried everything I could think of to regain access, but nothing seemed to work. At that point, I had all but given up on ever recovering the funds, but then I found FUNDS RECLIAMER COMPANY, and they turned everything around. When I first reached out to their team, I was honestly skeptical. After all, I had already tried numerous other methods, and none of them had yielded any results. But FUNDS RECLIAMER COMPANY took the time to understand my situation. They explained the recovery process thoroughly, showing me how their expertise in blockchain wallets and password recovery could potentially restore my access. They reassured me that it wasn’t a lost cause, and from that moment, I knew I was in good hands. The process itself was meticulous, involving some complex decryption techniques and cracking of passwords that I thought would be impossible. They didn’t rush or pressure me to make any decisions they simply worked with precision and dedication. One of the most reassuring things was that they kept me updated every step of the way. Even when it looked like we were hitting a wall, they remained confident and kept searching for solutions. Eventually, after a lot of hard work and persistence, they cracked the password and regained access to my old blockchain wallet. It was such an incredible feeling to finally see my Bitcoin balance again after years of being locked out. I had honestly written it off as lost money, but FUNDS RECLIAMER COMPANY proved me wrong. They were able to retrieve my funds and transfer them back to a secure wallet that I now control. What impressed me most about FUNDS RECLIAMER COMPANY was not just their technical ability, but their integrity and transparency. I was concerned about the safety of my funds during the recovery process, but they assured me that they had security measures in place to protect my assets. I was able to watch the recovery unfold with confidence, knowing that my Bitcoin was in safe hands. If you're struggling with an old blockchain wallet and think your Bitcoin is gone for good, I can’t recommend FUNDS RECLIAMER COMPANY enough. They specialize in this kind of recovery, and their team is both trustworthy and highly skilled. There’s truly nothing to lose by reaching out, and you might just find that your lost Bitcoin is still recoverable. I’m so grateful to them for their persistence and professionalism in getting my funds back it was an experience I won’t forget.
Email: fundsreclaimer(@) c o n s u l t a n t . c o m OR fundsreclaimercompany@ z o h o m a i l . c o m
WhatsApp:+1 (361) 2 5 0- 4 1 1 0
1 -
WHATSAPP +1 252 378 7611 PROFESSIONAL BITCOIN RECOVERY EXPERT FOR HIRE CONTACT CYBER CONSTABLE INTELLIGENCE
Information of Cyber Constable Intelligence
WhatsApp info: + 1 2 5 2 3 7 8 7 6 1 1
Email info: (support (@) cyberconstableintelligence ). com)
As a retired dentist, I found myself with ample free time but limited financial security. In search of a way to grow my savings, I turned to cryptocurrency trading. I joined several online forums and communities, where I read about the success others had found with Bitcoin. Their testimonies inspired me to take the plunge. With careful research and strategic investments, I managed to turn my initial investment into $250,000.The financial success brought a renewed sense of purpose and stability to my retirement. However, this newfound prosperity also attracted the envy of someone close to me: my financial advisor, whom I had trusted for years. Unbeknownst to me, he had been monitoring my success closely. One evening, while I was cooking supper, my financial advisor accessed my phone and changed the passwords to my accounts, attempting to transfer my Bitcoin to his wallet. I discovered this betrayal shortly after, feeling a mix of shock, panic, and anger. My financial future was in jeopardy, and I needed to act quickly. In my desperate search for a solution, I stumbled upon Cyber Constable Intelligence, a service specializing in recovering hacked accounts and lost cryptocurrency. With my savings hanging in the balance, I reached out to them, hoping for a miracle. The team at Cyber Constable Intelligence was prompt and professional. They reassured me that, despite the seriousness of my situation, there was a good chance they could help. Their calm and confident demeanor provided some much-needed comfort. They guided me through the recovery process, taking over the technical aspects and working tirelessly to regain control of my accounts. In a remarkably short time, Cyber Constable Intelligence managed to restore my access to my accounts and secure my Bitcoin. The relief I felt was indescribable. Not only had they recovered my funds, but they also provided essential advice on how to enhance the security of my digital assets. This experience taught me several valuable lessons. Firstly, trust must be carefully placed, even with long-term associates. Secondly, it's crucial to secure your digital assets with strong, unique passwords and two-factor authentication. Lastly, seeking professional help in times of crisis can make all the difference. After regaining control of my accounts, I severed ties with my financial advisor and took steps to ensure my assets were protected. Despite the ordeal, I emerged more knowledgeable and determined to safeguard my future. My experience with Cyber Constable Intelligence not only saved my investments but also reinforced the importance of vigilance and security in the digital age. -
Losing access to your cryptocurrency can be a devastating experience, whether due to forgotten passwords, hacking, scams, or technical errors. Fortunately, professional recovery services like BITCRACK RECOVERY EXPERTS specialize in retrieving lost or stolen crypto assets. If you’ve lost your Bitcoin or other cryptocurrencies, here’s how BITCRACK RECOVERY EXPERTS can help you recover your funds.
Why Choose BITCRACK RECOVERY EXPERTS?
BITCRACK RECOVERY EXPERTS is a trusted name in cryptocurrency recovery, offering advanced techniques to help victims of crypto theft, fraud, or accidental loss. Their team of blockchain forensic experts uses cutting-edge tools to trace transactions, identify wallet vulnerabilities, and recover inaccessible funds.
Services Offered by BITCRACK RECOVERY EXPERTS
Wallet Recovery – Regaining access to locked or lost crypto wallets.
Scam Investigation – Tracing stolen funds from fraudulent schemes.
Phishing & Hacking Recovery – Recovering crypto lost to cyberattacks.
Private Key Retrieval – Helping users restore lost or corrupted private keys.
Exchange & ICO Scam Recovery – Assisting victims of fake investment platforms.
Steps to Recover Your Lost Cryptocurrency
1. Contact BITCRACK RECOVERY EXPERTS
Reach out to their support team via email:
📧 bitcrackrecoveryexperts@bitcrack.co.site
Provide details such as:
The type of cryptocurrency lost (Bitcoin, Ethereum, etc.)
How the funds were lost (hack, scam, forgotten password, etc.)
Transaction details (wallet addresses, TXIDs, if available)
2. Initial Consultation & Case Evaluation
Their team will analyze your situation and determine the best recovery approach. They may request additional information to strengthen the investigation.
3. Recovery Process
Using blockchain forensics and legal methods, BITCRACK RECOVERY EXPERTS will trace the movement of your funds and attempt to recover them. This may involve:
Working with exchanges to freeze stolen assets
Identifying security breaches in wallets
Utilizing legal channels if necessary
4. Fund Retrieval & Secure Return
Once recovered, your cryptocurrency will be securely returned to a wallet under your control. The team ensures transparency throughout the process.
Tips to Avoid Future Crypto Losses
Use Hardware Wallets – Store crypto offline for maximum security.
Enable 2FA – Add an extra layer of protection to exchange accounts.
Beware of Scams – Avoid suspicious investment schemes and phishing links.
Backup Private Keys – Store keys securely in multiple locations.
Final Thoughts
Losing cryptocurrency doesn’t always mean it’s gone forever. With professional help from BITCRACK RECOVERY EXPERTS, there’s a strong chance of recovery. If you’ve fallen victim to theft, hacking, or accidental loss, don’t hesitate to contact them at:
✉️ bitcrackrecoveryexperts@bitcrack.co.site
Act quickly—the sooner you start the recovery process, the higher the chances of success2 -
DIGITAL TECH GUARD RECOVERY: EXPERT STRATEGIES FOR BITCOIN RECOVERY AND SECURITY.
Memory can be a tricky thing, especially when it comes to passwords. contact @ d i g i t a l t e c h g u a r d . c o m I experienced this firsthand when I completely forgot the password to my Bitcoin wallet holding $100,000. It was a chaotic week in our household, compounded by the fact that my daughter was sick, and I had set the password during this particularly stressful time. website l i n k : : h t t p s : / / d i g i t a l t e c h g u a r d . c o m With sleepless nights and constant worry weighing on my mind, the password I had chosen became a distant memory, lost in the whirlwind of my chaotic life. Desperate for help, I turned to Digital Tech Guard Recovery. I knew I needed expert assistance to get back into my wallet, but I also felt embarrassed about my situation. telegram +56 997 059 700 When I called them, their compassionate team quickly put me at ease. They listened patiently as I explained my predicament and the stress I had been under. Their understanding made me feel less alone in my struggle, and I was grateful to find people who genuinely cared about my situation. As they began working on my case, I was amazed at their expertise. They guided me through the recovery process step by step, using their advanced tools and techniques to help me regain access to my wallet. Throughout this journey, their professionalism shone through, and I felt a sense of reassurance knowing I had a knowledgeable team on my side. Days felt like an eternity as I anxiously awaited updates, but I kept reminding myself that I was in good hands. Each passing day brought a mix of hope and anxiety, especially with my daughter still unwell. I found myself wishing I could just turn back time to remember that elusive password. Finally, the day arrived when I received the call I had been waiting for. Digital Tech Guard Recovery had successfully restored my access to the wallet, and my $100,000 was safe! The relief that washed over me was indescribable. I felt an overwhelming sense of gratitude toward the team who had worked tirelessly to resolve my issue. This experience taught me a valuable lesson about the importance of writing down passwords (safely) and not letting stress dictate my financial decisions. Now, I keep my passwords organized and securely stored, ensuring that I never find myself locked out again. And as for my daughter, she’s on the mend now, reminding me to focus on what truly matters in life. -
Recuva Hacker Solutions — A Trusted Partner in Bitcoin Recovery
In the ever-evolving world of cryptocurrency, losing access to your Bitcoin wallet can be a nightmare. Whether it’s due to forgotten passwords, hardware failures, or misplaced private keys, the inability to access your digital assets can be incredibly stressful. Fortunately, there are specialized services dedicated to helping you recover your lost or inaccessible Bitcoin wallets. Among these, Recuva Hacker Solutions (RHS) has emerged as a trusted leader in the field of crypto asset recovery. Since 2017, Recuva Hacker Solutions has been providing top-tier recovery services, earning a reputation as the go-to solution for individuals and businesses alike.
In this article, we’ll explore the key features that make Recuva Hacker Solutions the best choice for Bitcoin wallet recovery, while also highlighting their commitment to security, usability, and customer support.
Why Choose Recuva Hacker Solutions for Bitcoin Wallet Recovery?
1. Proven Track Record Since 2017
Recuva Hacker Solutions has been a trusted name in the crypto recovery industry since 2017. With years of experience, they have successfully helped countless clients regain access to their lost or inaccessible Bitcoin wallets. Their expertise spans a wide range of recovery scenarios, including forgotten passwords, corrupted hardware wallets, and lost private keys.
2. Advanced Recovery Tools and Techniques
Recuva Hacker Solutions employs state-of-the-art tools and techniques to ensure the highest success rate in wallet recovery. Their team of skilled professionals uses advanced algorithms and forensic methods to recover lost data, making them one of the most reliable recovery services in the industry.
3. Unmatched Security Measures
Security is a top priority for Recuva Hacker Solutions. They understand the sensitive nature of crypto assets and ensure that all recovery processes are conducted with the utmost confidentiality and security. Their protocols are designed to protect your data and assets throughout the recovery process.
4. User-Friendly and Accessible
One of the standout features of Recuva Hacker Solutions is their commitment to usability. Their recovery process is straightforward and user-friendly, ensuring that even those with limited technical knowledge can navigate the service with ease. Additionally, their customer support team is available to assist you at every step.
5. Comprehensive Customer Support
Recuva Hacker Solutions takes pride in offering exceptional customer support. Whether you have questions about the recovery process or need assistance with a specific issue, their team is just a message or call away. They offer multiple communication channels, including email and WhatsApp, to ensure you can reach them conveniently.
How to Contact Recuva Hacker Solutions
If you’re looking to recover your lost Bitcoin wallet, Recuva Hacker Solutions is here to help. You can reach out to them through the following channels:
Website: https : / / recuvahacksolution . pro
Email: recuvahackersolutions @ recuva . co . site
WhatsApp: +1 [3]15 [756] [1228
Their team is available to provide personalized assistance and guide you through the recovery process.
Why Recuva Hacker Solutions is the Best Crypto Recovery Company
Recuva Hacker Solutions has consistently proven itself as a leader in the crypto recovery space. Their combination of advanced technology, experienced professionals, and customer-centric approach sets them apart from the competition. Whether you’re an individual investor or a business, you can trust Recuva Hacker Solutions to help you regain access to your valuable crypto assets.
3 -
CENTURY WEB RECOVERY is a reputable entity known for offering top-quality services in cryptocurrency recovery. They provide a vital lifeline to individuals who have fallen victim to theft or other mishaps in the digital currency realm.
Comprehensive Cryptocurrency Recovery Services
CENTURY WEB RECOVERY specializes in:
Accessing Inaccessible Funds: They address security issues that may prevent you from accessing your digital assets.
Retrieving Lost Passwords: Using advanced techniques, they can recover lost passwords, ensuring you regain control over your cryptocurrency accounts.
Contact Information
For inquiries or assistance, you can reach out to CENTURY WEB RECOVERY through the following channels:
· Email: century[@]cyberservices[.]com
· WhatsApp: +1,3,8,6,2,6,0,8,0,5,2
Conclusion
CENTURY WEB RECOVERY stands out as a reliable choice for those in need of cryptocurrency recovery services. With their expertise and advanced recovery techniques, they offer a beacon of hope for individuals seeking to reclaim their digital assets.1 -
I wanted to share my experience recovering a significant amount of Bitcoin and Ethereum $560,000 00 that I thought was lost forever due to a forgotten password and a risky investment in a scam project.
The Loss: After realizing I couldn't access my wallet, I felt completely defeated. I did some research and found several recovery options available. SOFTWEAR TECH SOLUTION
The Recovery Process: I used a reputable recovery tool that I found recommended by several users on this forum. It required me to verify my identity and provide proof of ownership, but after a few weeks of back and forth, I was able to access my wallet again!
Outcome: I successfully recovered 98% of my lost BTC and ETH! It was a huge relief, and I’m actively taking steps now to secure my assets better.
Advice: Always keep a secure backup of your passwords and consider using hardware wallets for better security. Don’t fall for scams – do thorough research before trusting any service.
I hope my experience helps someone else here!
CONTACT,: SOFTWEAR TECH SOLUTION FOR SWIFT RECOVERY
Email: softweartech5@ gmail. com
Email: softewar.tech@ yandex. com1 -
HOW TO HIRE A GENUINE CRYPTO RECOVERY SERVICE CONTACT SPARTAN TECH GROUP RETRIEVAL
All the time, I had believed in networking, but I never knew that a local crypto meetup would save me from financial disaster. Discussion at the event ranged from trading strategies to security tips, but one name cropped up repeatedly that sounded impressive: SPARTAN TECH GROUP RETRIEVAL. Many spoke about how that service had rescued them from lost wallets, forgotten passwords, and even cyber-attacks. I filed that away mentally but never thought I'd find myself in that position. That changed just weeks later. One morning, I went into my Bitcoin wallet and saw suspicious activity. My heart sank as I realized that $180,000 in crypto was on the line. Someone had access, and if I didn't act fast, I'd lose everything. Panic set in, and I scrambled to figure out how it happened: had I clicked a phishing link, was my private key compromised? No matter the cause, I needed help. And fast. That's when I remembered the crypto meetup. I scrolled through my notes and found SPARTAN TECH GROUP RETRIEVAL's name. With no time to waste, I sent a reply-my anxious and desperate words spilling into one frenetic sentence. They responded very fast and professionally. They immediately initiated an investigation into my wallet's transaction history and security logs. They were able to trace the breach and lock it, trying not to be late in recovering the stolen money. Then they worked around the clock for several days, coordinating tracking on the blockchain, forensic data recovery, and reinforcements of security. I barely slept, but at each and every stage, they kept reassuring me. Then came that call I was praying for: They had recovered my funds. Speechless. Relieved. Grateful. But SPARTAN TECH GROUP RETRIEVAL didn't just stop with the recovery, teaching me means of security practices, helped fortify the defense around my wallet, and making sure this does not happen again. I consider it one of the best I have done so far-attending that crypto meet-up. I might never have heard of SPARTAN TECH GROUP RETRIEVAL if it had not been that night, or the outcome worse. Now I do my best to spread the word. For a reason is their reputation preceding them, and personally I can vouch for their expertise, efficiency, and reliability.
SPARTAN TECH GROUP RETRIEVAL CONTACT INFO:
Email: spartantech (@) cyber services . com OR support (@) spartantechgroupretrieval. org
Website : h t t p s : / / spartantechgroupretrieval. org
WhatsApp: +1 (971) 487 - 3538
Telegram: +1 (581) 286 - 8092
6 -
My name is Sharron Maggie , and I’m a graduate of Stanford University. After finishing my degree, I faced immense challenges in finding a sustainable job that would allow me to pay off my student loans and live the life I desired. In my search for financial stability, I stumbled upon cryptocurrency trading, specifically Bitcoin. I invested hoping to turn my situation around, and I watched my assets soar to an impressive $500,000.
However, my journey took a dark turn when I received an email that appeared to be from my crypto exchange, prompting me to verify my account. I clicked the link and entered my information, only to realize minutes later that it was a phishing scam. In an instant, my account was drained of all its funds. Feeling desperate and devastated, I turned to a friend who had faced similar challenges, and he recommended Trust Geeks Hack Expert. Skeptical but with nothing to lose, I decided to contact them. From the first interaction, their team was incredibly responsive and professional, assuring me they had successfully handled cases like mine.
Trust Geeks Hack Expert immediately began securing my accounts and tracing the transactions. They worked with cybersecurity experts to freeze any fraudulent transfers and managed to recover a significant portion of my assets. Their expertise was impressive, and they took the time to educate me about the importance of strong, unique passwords and enabling two-factor authentication. What stood out to me was their holistic approach to the recovery process. Trust Geeks Hack Expert not only focused on retrieving my funds but also guided me in enhancing my online security to prevent future attacks. They taught me to recognize phishing scams and reinforced the need for robust security practices.
This experience was a harsh but valuable lesson in online security. It made me more vigilant about my digital presence and interactions. Thanks to Trust Geeks Hack Expert, I not only regained most of my assets but also acquired essential knowledge on protecting my investments moving forward. If you ever find yourself in a similar situation, I wholeheartedly recommend reaching out to Trust Geeks Hack Expert.
(CONTACT SERVICE )
E ma il ---> Trustgeekshackexpert [At] fast service . com
Tele gram ID ---> Trustgeekshackexpert
Web site ----> https :// trustgeekshackexpert. com/ -
Being a seasoned cryptocurrency trader, I always prided myself on my keen instincts and successful track record. However, even the most experienced can fall prey to greed and deception, as I learned the hard way. My downfall began when a stranger contacted me, offering an irresistible deal on Bitcoin. The potential buyer promised a sum well above the market rate, tempting me with the prospect of a substantial profit. Blinded by the lucrative offer, I decided to proceed without my usual caution. The deal seemed too good to be true, but I ignored my gut feeling, enticed by the numbers. The stranger posed as a legitimate buyer, and after several conversations, I felt assured enough to transfer a significant amount of my Bitcoin to the supposed buyer’s wallet. Almost immediately, things went wrong. The buyer vanished, locking me out of my Bitcoin wallet and leaving me in a state of panic. I had stored $120,000 worth of Bitcoin in that wallet. The realization of potentially losing such a substantial amount was a harsh blow. The scammers had not only taken my Bitcoin but also managed to gain access to my email and other passwords, putting more of my assets and personal information at risk. In my desperation, I remembered a friend mentioning RAPID DIGITAL RECOVERY, a service known for handling such crises. With nothing to lose, I reached out to them. The team at RAPID DIGITAL RECOVERY quickly responded, assuring me they would do everything possible to recover my lost assets. Through their expertise, they managed to secure my email and passwords, preventing further access by the scammers. More importantly, they were able to recover my Bitcoin wallet, restoring the $120,000 worth of Bitcoin that I had feared was lost forever. The relief I felt was immense; I had narrowly avoided a financial disaster. This harrowing experience served as a sobering lesson for me. I realized that even the most experienced traders could be blindsided by greed and that vigilance is paramount in the world of cryptocurrency. I now emphasize the importance of security and due diligence, no matter how tempting a deal might appear. Thanks to RAPID DIGITAL RECOVERY, I regained control of my assets and learned a valuable lesson about the dangers of greed and the importance of cybersecurity. I hope my story will serve as a cautionary tale to others in the crypto trading community, reminding them to stay vigilant and never compromise on security.
EMAIL: suppor(@)rapiddigitalrecovery.org
EMAIL: contact (@)rapiddigitalrecovery..... org
WHATSAPP: +1 4. 1. 4. 8. 0. 7. 1. 4. 8. 5
-
As cryptocurrency continues to reshape global finance, safeguarding Bitcoin and other crypto wallets is more important than ever. Unfortunately, wallet access issues—whether due to lost passwords, forgotten seed phrases, or even hacking incidents—are a common challenge for Bitcoin owners. Century Web Recovery, trusted since 2017, has emerged as a reputable resource for those seeking to regain access to their cryptocurrency wallets.
What is Bitcoin Wallet Recovery?
Bitcoin wallet recovery is the process of retrieving access to a Bitcoin wallet when the user is locked out. Wallet access issues can occur for various reasons, such as lost private keys, forgotten passwords, or corrupted wallet files. For those who’ve lost access, reputable recovery services can be an invaluable asset, helping them safely regain control of their funds.
Century Web Recovery offers specialized recovery services that cover a broad range of wallet types and access issues, providing the expertise needed to retrieve lost assets and restore access to cryptocurrency wallets.
Why Wallet Recovery Services Matter
Without access to your wallet, Bitcoin holdings can become permanently inaccessible. The decentralized nature of Bitcoin means there’s no central authority or “forgot password” feature that can restore access. This gap has led to a high demand for trustworthy wallet recovery services like Century Web Recovery, which uses a combination of technical expertise and proprietary tools to assist clients.
Century Web Recovery: Trusted Bitcoin Wallet Recovery Since 2017
Century Web Recovery has built a reputation as a reliable and secure recovery service provider since its establishment in 2017. Their team is composed of experienced blockchain analysts and cybersecurity experts who specialize in recovering wallet access in cases of forgotten passwords, corrupted files, or lost keys. Clients seeking to regain access to Bitcoin wallets can learn more about Century Web Recovery can help by contacting them through the details provided below.
Century Web Recovery Approaches Wallet Recovery
Initial Consultation and Assessment
Century Web Recovery begins with a thorough consultation, understanding the client’s situation and the specific wallet issue. This assessment allows the team to determine the best recovery strategy.
Technical Recovery Process
Century Web uses advanced recovery tools and techniques tailored to different wallet types, whether software, hardware, or paper-based. By leveraging cryptographic methods and advanced decryption software, the team can restore access to wallets securely.
Ensuring Client Security and Confidentiality
Security and confidentiality are top priorities. Century Web Recovery applies secure handling protocols throughout the recovery process, ensuring that clients’ information and assets remain protected.
Recovery Completion and Client Education
Upon successful recovery, Century Web provides clients with guidance on how to safeguard their wallets and private keys to avoid future access issues. This education reinforces wallet security and fosters long-term peace of mind.
Why Choose Century Web Recovery?
Not only does Century Web Recovery have a strong track record of successful recoveries, but it also offers an upfront pricing model to keep costs transparent. For clients who are locked out of their wallets, the technical capabilities and secure approach Century Web offers make it a leading choice in the crypto recovery space.
Contact Century Web Recovery
To learn more or initiate the recovery process, clients can reach out to Century Web Recovery. If you’re locked out of your Bitcoin wallet, now is the time to restore access and regain control of your digital assets with a company that’s trusted since 2017. You can reach out to us by searching us on google century web recovery and get all our contact details.1 -
My Experience with Infinite Digital Recovery
I'm sharing my story to warn others about cryptocurrency scams and recommend a reliable recovery service. Recently, I fell victim to a romance scammer who deceived me into investing in a fake trading coin. I lost my inheritance, which my late mother had left to me.
Devastated and confused, I searched for a solution and discovered Infinite Digital Recovery. Their team of experts has the necessary skills, expertise, and advanced technology to navigate the complex world of cryptocurrency theft and recovery.
Place your trust in reputable crypto recovery services like Infinite Digital Recovery. Be patient and allow the experts to work diligently on your behalf.
Key Takeaways:
1. Enhance your security practices by reviewing cryptocurrency storage methods, employing strong passwords, enabling two-factor authentication, and considering hardware wallets.
2. Educate yourself on best practices for protecting your digital assets.
3. Share your successful recovery story with others to provide hope and assistance during difficult times.
Infinite Digital Recovery is a well-trained professional team that excels in other hack services, such as school upgrades and mobile spy access. You can reach them via email or WhatsApp.
EMAIL: infinitedigitalrecovery AT techie DOT com
WHATSAPP: +1 323 554 35921 -
DOES CRYPTO RECOVERY ACTUALLY WORK? YES IT DOES- GEARHEAD ENGINEERS CASE STUDY
Losing access to your cryptocurrencies can be a nightmarish scenario. Whether you forget your passwords, fall victim to fake trading platforms or phishing scams, or experience hardware failures with your crypto wallet, the first thing you might want to do is contact a crypto recovery service. However, the unfortunate reality is that while few crypto recovery services are legitimate, most are scams designed to prey on those already in distress. Getting scammed while attempting to recover from a previous scam would be the worst-case scenario. It often makes you wonder whether crypto recovery is truly possible. In reality, tracing and getting back your crypto can only be done by individuals who have the expertise to navigate the vulnerabilities of the scammer’s systems and obtain crucial details that can be used to track transactions and eventually retrieve crypto back to the victims. GearHead Engineers have been proven time and again to be the leading legitimate recovery services. This eliminates the need to go from one organization to another seeking for legit services. Get the contact details by visiting their website by doing an online search of Gearhead Engineers then click on the website indicated as Gearhead engineers- cyber security company.2 -
THE BEST CRYPTO RECOVERY SERVICE IN 2024 HIRE DUNAMIS CYBER SOLUTION
A
Cautionary Tale About a Sophisticated Scam Three days ago, I fell victim to a highly sophisticated scam that cost me 30,000 Euros. As a London resident, I’ve always prioritized online security. When I heard about the LastPass breach, I immediately changed my passwords, believing my information was safe. However, I soon realized that the worst was yet to come.The scam started with an email that appeared to be from LastPass, warning me about unusual activity. It seemed legitimate—complete with branding and an urgent subject line. The email included a customer support number, which I called in panic.A calm, professional-sounding individual answered, claiming to be a LastPass security expert. They told me my account had been compromised and advised me to install recovery software. Trusting them, I followed their instructions without realizing I was being scammed.Hours later, I discovered that 30,000 Euros had been drained from my bank accounts. After the initial shock, I found DUNAMIS CYBER SOLUTION Recovery, a company specializing in scam recovery. They acted swiftly, helping me trace the scammers and recover the stolen funds.While the experience was harrowing, it taught me an invaluable lesson: Always verify the authenticity of any communication, no matter how convincing it seems. If you fall victim to a scam, don’t hesitate to reach out to experts who can help you recover.
8 -
HOW TO RECOVER STOLEN CRYPTOCURRENCY WITH A GENUINE RECOVERY SERVICE;WEB BAILIFF CONTRACTOR
Life is ridiculously amusing. I was waiting in line for my morning coffee one minute and was witness to a barista extolling the virtues of Web Bailiff Contractor as if they were superheroes in the real world.
I chuckled it away at the time. I figured that I would never require any such crypto recovery services. My wallet was secure, my security was on solid foundations-or so I believed.
All that ended a week afterwards. I was going to send some Bitcoin when, all of a sudden, my wallet rejected my credentials. Wrong password.
I tried again. And again. Panic set in.
My $330,000 was trapped, and for the life of me, I could not recall the password. I was certain I had it correct, but the wallet disagreed. That is when I recalled the barista's glowing recommendation of Web Bailiff Contractor; in a state of desperation, I searched for them and chose to contact them. From the initial message, their staff was patient, friendly, and very professional, and I felt confident that I wasn't the first-let alone the last-man in the world who lost access to his wallet due to a forgotten password. They were that confident that they reassured me, but I just could not help myself: I worried. Was my Bitcoin lost forever? No chance. Their technicians worked through several complicated decryption techniques over the course of the next few days to decrypt my lost password. They worked through the security levels, attempted all manner of likely variations, and-amazingly-got me logged back on. I felt like I'd won the lottery when I was presented with my balance again. I must have sounded exactly like that barista, praising the merits of Web Bailiff Contractor to anyone who would hear me, because the relief was total. Not only did they restore my funds, but they provided me with sensible advice regarding password management, locking down my crypto, and how to steer clear of such calamities in the future. To this day, whenever I walk by that coffee shop, I always leave a generous tip—just because, if it weren't for that chat, I might still have been shut out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever get locked out of your crypto, Web Bailiff Contractor is the one to contact.1 -
Santoshi Hackers Intelligence can help you recover your BTC by providing an experienced team of security experts and forensic investigators who can investigate the loss, identify the source of the compromise, and provide technical services to help you retrieve your stolen currency. In addition, Santoshi Hackers Intelligence can provide you with educational materials for staying safe online and give you access to cutting-edge cyber threat intelligence.
1] you need to retrieve your passwords Social Media Accounts consult SHI.
Major Cryptocurrencies SHI, Professional with to recover any misplaced or corrupted wallet hacked by scammers SHI is the answer you need. Bitcoin ( BTC) Ethereum (ETC) Binance Coin (BNB) Tether (USDT)-Stablecoin USD Coin ( USDC) (XRP) Card.2 -
Living in Los Angeles, California for the past five years has been a journey of hard work and dedication. My primary goal was to provide a better future for my family. I worked tirelessly, saving every penny to ensure we had the financial security we deserved. My dream was to build a stable life for my wife and children, and I invested in various assets, including a digital wallet for trading and savings. Little did I know, disaster was looming just around the corner .One fateful day, a devastating fire broke out in our area. While I was at work, my wife and children were visiting their grandmother in Houston, so they were safe from the immediate danger. Unfortunately, the fire quickly spread, and by the time it was under control, our home had been completely destroyed. Everything we owned, our furniture, personal belongings, and treasured memories was reduced to ashes. I was devastated, but grateful that my family was safe. However, as I returned to Los Angeles to deal with the aftermath, I discovered something even more distressing: my computer, along with the physical notebook where I had written down the passwords to my digital wallet, had gone missing in the fire. This was a huge blow, as I had stored crucial information related to my investments and digital assets on that computer. Without those passwords, I had no way of accessing my crypto funds, which were an essential part of the financial security I had worked so hard to build .Desperate to retrieve my funds, I boarded a flight to Houston to be with my family and also figure out how to recover my lost passwords. While on the plane, I searched for solutions, and after reading several online forums and testimonials, I came across CRYPTO RECOVERY SOLUTION . They specialized in recovering lost passwords for digital asset wallets and had a track record of helping people in similar situations .I as soon as I landed in Houston. The team immediately got to work, analyzing my case and using an advanced recovery method contacted CRYPTO RECOVERY SOLUTION to retrieve my lost wallet passwords. Within just three days, they successfully recovered access to my digital wallet and the funds I had invested. Their expertise in digital forensics and blockchain technology was evident, and I was amazed at how quickly they managed to resolve the issue .Thanks to CRYPTO RECOVERY SOLUTION , I was able to reclaim my assets and breathe a sigh of relief during such a challenging time. Their professionalism and commitment to helping individuals like me restored not only my financial stability but also my faith in the possibility of recovery, even after a devastating loss. I am forever grateful for their assistance.
WhatsApp number: +1 (332) 233‑2121
1 -
Best Recovery Experts for Cryptocurrency Assets
As the cryptocurrency landscape evolves, so do its associated risks, such as phishing scams and hacks. Recovery experts have become invaluable allies for investors navigating these challenges. Below, we explore the best recovery experts for cryptocurrency assets.
Crypto Recovery Companies
Crypto recovery companies offer services like unlocking encrypted wallets, recovering forgotten passwords, and restoring Bitcoin accounts. They prioritize privacy and implement robust security protocols to protect financial information throughout the recovery process.
These companies employ skilled teams equipped with blockchain expertise, cutting-edge tools, and investigative strategies to recover lost or inaccessible digital assets. Their goal is to assist individuals who thought their digital wealth was irretrievably gone.
With the growing use of cryptocurrencies, demand for recovery solutions has surged, driven by the rise in stolen cryptocurrency cases and the need for effective recovery strategies. Recovery experts use advanced software, forensic methods, and in-depth blockchain knowledge to trace missing funds, decrypt wallets, and regain account access.
Puran Crypto Recovery
Puran Crypto Recovery simplifies the recovery process for victims of cryptocurrency theft with tailored, professional support. Known for reliability and efficiency, they offer:
Comprehensive Recovery Support: Puran Crypto Recovery employs secure and effective methods to restore lost assets.
Global Availability: Their worldwide team ensures assistance is accessible anytime and anywhere.
Expertise and Experience: With a proven track record, Puran Crypto Recovery provides clients with confidence and trust in their recovery services.1 -
Can anyone recommend a good password manager that is 'in the cloud', can be used on my mobile and makes life easy for logging into apps on my phone that aren't logged in via a browser. Ideally something free but I'm willing to pay for something that is worth it8
-
A crypto influencer on TikTok posted about his $100,000 recovery with CRANIX ETHICAL SOLUTIONS HAVEN. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong. Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment. Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I contacted the influencer, desperate for an honest answer: Is CRANIX ETHICAL SOLUTIONS HAVEN actually legit? The response came immediately. "100%. They saved me. Reach out now." That was all I needed. I contacted CRANIX ETHICAL SOLUTIONS HAVEN, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly. Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief. Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again. That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow CRANIX ETHICAL SOLUTIONS HAVEN before you ever need them.
EMAIL: cranixethicalsolutionshaven @ post . com
WHATSAPP: +44 7460 622730
TELEGRAM: @ cranixethicalsolutionshaven1 -
BITCOIN RECOVERY EXPERT HIRE CRYPTO RECOVERY SOLUTION /
Living in Los Angeles, California for the past five years has been a journey of hard work and dedication. My primary goal was to provide a better future for my family. I worked tirelessly, saving every penny to ensure we had the financial security we deserved. My dream was to build a stable life for my wife and children, and I invested in various assets, including a digital wallet for trading and savings. Little did I know, disaster was looming just around the corner. One fateful day, a devastating fire broke out in our area. While I was at work, my wife and children were visiting their grandmother in Houston, so they were safe from the immediate danger. Unfortunately, the fire quickly spread, and by the time it was under control, our home had been completely destroyed. Everything we owned, our furniture, personal belongings, and treasured memories was reduced to ashes. I was devastated, but grateful that my family was safe. However, as I returned to Los Angeles to deal with the aftermath, I discovered something even more distressing: my computer, along with the physical notebook where I had written down the passwords to my digital wallet, had gone missing in the fire. This was a huge blow, as I had stored crucial information related to my investments and digital assets on that computer. Without those passwords, I had no way of accessing my crypto funds, which were an essential part of the financial security I had worked so hard to build. Desperate to retrieve my funds, I boarded a flight to Houston to be with my family and also figure out how to recover my lost passwords. While on the plane, I searched for solutions, and after reading several online forums and testimonials, I came across CRYPTO RECOVERY SOLUTION . They specialized in recovering lost passwords for digital asset wallets and had a track record of helping people in similar situations. I as soon as I landed in Houston. The team immediately got to work, analyzing my case and using an advanced recovery method contacted CRYPTO RECOVERY SOLUTION to retrieve my lost wallet passwords. Within just three days, they successfully recovered access to my digital wallet and the funds I had invested. Their expertise in digital forensics and blockchain technology was evident, and I was amazed at how quickly they managed to resolve the issue. Thanks to CRYPTO RECOVERY SOLUTION , I was able to reclaim my assets and breathe a sigh of relief during such a challenging time. Their professionalism and commitment to helping individuals like me restored not only my financial stability but also my faith in the possibility of recovery, even after a devastating loss. I am forever grateful for their assistance.
WhatsApp number: +1 (332) 233‑2121
1 -
BITCOIN RECOVERY EXPERT FOR HIRE REVIEWS \\ REVENANT CYBER HACKER
Losing a Bitcoin wallet containing a substantial amount of cryptocurrency can be a devastating experience. However, the feeling of despair and loss was transformed into pure happiness when I received the incredible news from REVENANT CYBER HACKER that my lost Bitcoin wallet, holding 132,000 bitcoins, had been successfully recovered. In this article, I will share the rollercoaster emotional journey I went through when I lost my wallet, the subsequent discovery of REVENANT CYBER HACKER, the process they employed to retrieve my precious digital assets, and the lessons learned along the way. This is a story of hope, resilience, and the power of professional recovery services in restoring lost Bitcoin wallets. Ah, the sweet sound of good news. There I was, minding my own business on an average Tuesday morning, when I got a notification that would make any bitcoin enthusiast jump for joy. It was a message from none other than REVENANT CYBER HACKER, informing me that my long-lost bitcoin wallet had been found. And not just any bitcoin wallet, mind you, but one containing a whopping 132,000 units of the beloved cryptocurrency. Now, for those living under a rock or perhaps too preoccupied with the latest cat videos, let me give you a crash course in Bitcoin 101. Bitcoin is a digital currency that has taken the world by storm, captivating the minds of tech-savvy investors and casual enthusiasts alike. It operates on a decentralized network, meaning it doesn't answer to any central authority like a bank. Instead, it relies on blockchain technology, which adds a layer of security and transparency to every transaction. To own bitcoin, you need a wallet – a digital container where your precious coins reside. Think of it as a virtual piggy bank, except you don't need a hammer to break it open. Your wallet comes with a unique address, like a digital fingerprint, that allows you to send and receive bitcoin. Losing access to this wallet is as heart-wrenching as misplacing your favorite pair of socks. Trust me, it's not a pleasant feeling. My encounter with the disappearance of my Bitcoin wallet taught me a valuable lesson about the importance of implementing proper security measures. It's not enough to rely on luck or hope that your digital assets will remain safe. Taking proactive steps to protect your investments is crucial in the wild world of cryptocurrencies. From using strong and unique passwords to enabling two-factor authentication, every layer of security adds another brick to the fortress that safeguards your digital wealth. Trust me, you don't want to learn this lesson the hard way. It has changed my life to be able to retrieve my misplaced Bitcoin wallet thanks to REVENANT CYBER HACKER amazing services. It made me realize the worth of tenacity.
Website: revenantcyberhacker {DOT} org
Email: revenantcyberhacker {AT} Gmail {DOT} com
Telegram: revenantcyberhacker
WhatsApp: + 1 (208) 425-8584
WhatsApp: + 1 (913) 820-07392 -
Recover Your Hard-Earned Crypto // Expert Recovery Services
The most well-known cryptocurrency in the world, Bitcoin, has become extremely popular in recent years. More people and companies are adopting Bitcoin and other cryptocurrencies as a form of investment due to their anarchic framework and high return potential. Nevertheless, the emergence of Bitcoin has also given rise to a number of security issues, resulting in instances of lost or unreachable Bitcoins. Consequently, there is an enormous increase in demand for expert Bitcoin recovery services. Ever felt like your heart sinks when you realise you can’t get to your Bitcoin? There is a bigger demand than ever for trustworthy Bitcoin recovery services due to the rising popularity of Bitcoin and other cryptocurrency. The security risks connected with Bitcoin are growing along with its value and use. There are several possibilities for consumers to lose access to their priceless digital assets, including device malfunctions, cyberattacks, and forgotten passwords and wallet seeds. Cyberspace Hack Pro
can help in this situation. Cyberspace Hack Pro is the legitimate sidekick when it comes to obtaining your unidentified or unaccessible Bitcoins back. Years of experience and unmatched knowledge have allowed them to assist many people in regaining access to their digital assets. Cyberspace Hack Pro provides specialized solutions that increase your chances of getting your Bitcoins back by analyzing your particular circumstances and using cutting-edge recovery methods. I will suggest your urgent request for support from Cyberspace Hack Pro team through: Do not get left behind. Contact Cyberspace hack pro through
WhatsApp +1 (659) 217 92392 -
BEST BITCOIN RECOVERY EXPERT: A COMPREHENSIVE GUIDE WITH RAPID DIGITAL RECOVERY
A crypto influencer on TikTok posted about his $100,000 recovery with Rapid Digital Recovery. I was hyped along with him and decided to follow it, just in case. At that time, I wasn't worried, as I did have everything: two-factor authentication, backups on cold storage, and strong passwords. I thought I was untouchable. Wrong.
Months later, I woke up to a nightmare: my wallet, holding $320,000, was completely drained. I checked my email-nothing. I checked my security logs-no alerts. How did this happen? I scrambled through every account, searching for clues. That's when I saw it—a phishing attack. I had clicked on a link for a fake update weeks prior, and the hackers had been patiently waiting for their moment.
Panic set in. I scoured the internet for solutions, but every forum post, every so-called "expert" I contacted-all were saying the same thing: Once it's gone, it's gone. But then I remembered that TikTok post. I DMed the influencer, desperate for an honest answer: Is Rapid Digital Recovery actually legit? The response came immediately. "100%. They saved me. Reach out now."
Website: https: // rapid digital recovery. org
That was all I needed. I contacted Rapid Digital Recovery, hoping for a miracle. From the very first message, they were professional, calm, and insanely knowledgeable. They asked the right questions, identified how my funds had been stolen, and immediately set their forensic recovery tools in motion. While I was drowning in anxiety, they worked methodically, patiently, and relentlessly.
What sapp: +1 4.14 8.0 71.4 8.5
Hours felt like days, then the message came: "We've recovered your funds." I reread it a total of three times. Every last dollar was back. I had gone from devastation to absolute disbelief and relief.
Not only did they recover my money, but they also educated me on what had gone wrong. They walked me through better security practices, helped me secure my wallets properly, and ensured that I'd never fall for the same trick again.
That TikTok post? It saved me. And now, I'm the one telling everyone I know: Follow Rapid Digital Recovery before you ever need them.
Email: rapid digital recovery (@) execs. com
1 -
CONTACT A CRYPTO RECOVERY AGENCY -CONSULT SALVAGE ASSET RECOVERY
Life is amusingly funny. One minute I was waiting for my morning coffee, and the next, I was eavesdropping on a barista raving about SALVAGE ASSET RECOVERY like they were actual superheroes.
At the time, I laughed it off. I was under the impression that I would never need such crypto recovery services. My wallet was safe, my security was on solid grounds-or so it seemed.
That all changed one week later. I had been planning to transfer some Bitcoin when, out of nowhere, my wallet rejected my credentials. Incorrect password.
I tried again. And again. Panic set in.
My $330,000 was locked away, and for the life of me, I couldn't remember the password. I was sure I had it right, but the wallet said otherwise. That's when I remembered the barista's enthusiastic endorsement of SALVAGE ASSET RECOVERY; desperate, I looked them up and decided to reach out. From the very first message, their team showed patience, understanding, and a great deal of professionalism, assuring me that I wasn't the first-not to say the last-person in the world who had lost access to his wallet because he forgot the password. Their confidence set me at ease, but I couldn't help it: I was nervous. Was my Bitcoin gone forever? Not a chance. Over the succeeding days, their experts worked through different advanced decryption techniques to crack my forgotten password. They swam through the security layers, tested all sorts of possible variations, and-miraculously-got me back in. It felt like I had won the lottery when I saw my balance restored. I must have sounded just like that barista, singing SALVAGE ASSET RECOVERY's praises to anyone who would listen, as the relief was overwhelming. They didn't just recover my funds but also gave me practical advice on password management, securing my crypto, and avoiding similar disasters in the future. Nowadays, every time I pass that coffee shop, I make sure to leave a fat tip—just because, if it wasn't for that conversation, I could still be locked out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever find yourself locked out of your crypto, SALVAGE ASSET RECOVERY is the name to remember. You can reach out to SALVAGE ASSET RECOVERY contact info
TELEGRAM---@Salvageasset
WHATSAPP...+ 1 8 4 7 6 5 4 7 0 9 6
1 -
EXPERIENCE BTC SCAM RECOVERY SERVICE- CONTACT SALVAGE ASSET RECOVERY
WhatsApp+ 1 8 4 7 6 5 4 7 0 9 6
Life is amusingly funny. One minute I was waiting for my morning coffee, and the next, I was eavesdropping on a barista raving about Salvage Asset Recovery like they were actual superheroes.
At the time, I laughed it off. I was under the impression that I would never need such crypto recovery services. My wallet was safe, my security was on solid grounds-or so it seemed.
That all changed one week later. I had been planning to transfer some Bitcoin when, out of nowhere, my wallet rejected my credentials. Incorrect password.
I tried again. And again. Panic set in.
My $330,000 was locked away, and for the life of me, I couldn't remember the password. I was sure I had it right, but the wallet said otherwise. That's when I remembered the barista's enthusiastic endorsement of Salvage Asset Recovery; desperate, I looked them up and decided to reach out. From the very first message, their team showed patience, understanding, and a great deal of professionalism, assuring me that I wasn't the first-not to say the last-person in the world who had lost access to his wallet because he forgot the password. Their confidence set me at ease, but I couldn't help it: I was nervous. Was my Bitcoin gone forever? Not a chance. Over the succeeding days, their experts worked through different advanced decryption techniques to crack my forgotten password. They swam through the security layers, tested all sorts of possible variations, and-miraculously-got me back in. It felt like I had won the lottery when I saw my balance restored. I must have sounded just like that barista, singing Salvage Asset Recovery's praises to anyone who would listen, as the relief was overwhelming. They didn't just recover my funds but also gave me practical advice on password management, securing my crypto, and avoiding similar disasters in the future. Nowadays, every time I pass that coffee shop, I make sure to leave a fat tip—just because, if it wasn't for that conversation, I could still be locked out of my Bitcoin.
Lesson learned: Always double-check your passwords. And if you ever find yourself locked out of your crypto, Salvage Asset Recovery is the name to remember.
1









