this post was submitted on 06 Oct 2023
393 points (97.1% liked)

World News

32282 readers
609 users here now

News from around the world!

Rules:

founded 5 years ago
MODERATORS
 

At least a million data points from 23andMe accounts appear to have been exposed on BreachForums. While the scale of the campaign is unknown, 23andMe says it's working to verify the data.

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 0 points 1 year ago* (last edited 1 year ago) (1 children)

Yes. Doesn’t mean you have to save my ip address that I used.

Who the fuck said anything about saving an IP?

Or even the general location I used it from even if it will increase security.

IP lookups are not "saving your location".

Shrug. What does that means? You can control the info logged in server and also if you choose to keep it or classify it.

No... Not at all. If you reach out to my server, my server has to know where to send the data back to. Part of this process can be an IP lookup that actually identifies where your ASN is based out of. There is no way around this... the request MUST have IP information. Nobody said shit about logging anything. And logging IPs is not required to do anything that I've mentioned.

Sigh! now you are arguing on definition of tracking.

No... I'm arguing pedantic shit. I'm telling you what actually happens and what the actual definition is.

Edit: To the point. I actually do IP lookups to BLOCK specific countries in my router. Using a database like maxmind you can get a general idea of location without knowing anything specific at all. So it goes 1 step further to run a check on if your current ASN is even remotely close to your known location. If not, fire off email. nothing about this requires any logging or outside information than what you already gave the company in this case. Other fields use these mechanisms that are well regulated and nobody else except for you calls this "tracking".

[–] [email protected] 0 points 1 year ago (1 children)

If you reach out to my server, my server has to know where to send the data back to.

The "where" in above quote is my ip. That's all nothing else.

Nobody said shit about logging anything.

?? Let's pretend that's true. Ignoring the previous comment.

Why not. Wouldn't your so called "security" will increase if they log things so they are more sure of your identify.

[–] [email protected] 1 points 1 year ago (1 children)

The “where” in above quote is my ip. That’s all nothing else.

Correct... Which you can use ASN data to determine general location... If 1 million people start logging in from the same set of ASNs or ASNs known to be VPN services. That's a red flag... I'm not sure how many times I can state this... Especially since your server is serving the requests that are these malicious people logging in. You can check the query/account details against the IP location WITHOUT LOGGING ANYTHING.

Why not. Wouldn’t your so called “security” will increase if they log things so they are more sure of your identify.

Now you purposefully conflating what I specifically said and am imparting some mystical properties I never stated were required. You're a terrible person who goes out of their way to argue in bad faith.

I was clear and specifically outlined what mechanism should be put in place. I never stated anything about logging. then you come out of the woodwork and complain that logging is bad and argue against that point. And now here you are claiming that it would increase security. Bro... nobody here said shit about logging. Go argue with someone else.

My original comment, and every one since then has not made any requirements that logging is enabled. You can view active TCP connections without logs. You don't need behavior tracking to do these things. You don't need logging. This can be done without ANY of that shit and is regularly done on the internet without logging. You must think that companies have unlimited storage space... to store infinite logs and that logs are the end all-be all of how all of computing works.

Ignoring the previous comment.

Until you can show where I said ANYTHING that REQUIRES logging to function. This conversation is over since you've proven at this point you're arguing in bad faith.