Hacker Newsnew | past | comments | ask | show | jobs | submit | laurenceputra's commentslogin

GIL? I've found that a single thread is slower than not running a thread at all.


4chan with facebook login?


i'm not assuming you are incompetent. what i'm saying is that no system is fully secure, and by saving the users' passwords, you are risking them.

one of the first rules i learnt in web development is this, you do not store passwords. (http://www.codinghorror.com/blog/2010/12/the-dirty-truth-abo...) you never assume that your system will be so secure that no one can hack it.


Indeed, no system is fully secure, and we don't try to hide that fact, that's one of the reasons Dropmyemail exists in the first place. We offer people an off-site backup at the cost of trusting a third party with their password. This is a risk assessment discussion, and I believe although good for raising awareness about what dropmyemail offers, the original articles fails to make a distinction between the objective information it provides and what are your personal valuations on the risk involved (for example, it assumes one of the worst possible scenarios regarding our competence). Things get a bit confusing when non security related topics like storage capacity are mixed in though. I believe you are trying to help people to be safe and choose the better tool to solve their problem, I do think you are underestimating them a bit, but in case I'm wrong I repeat how valuable your article is in raising this issues.


And again, I am not doubting your competence. What I am saying is that we are all humans. Google might have hired the best computer scientists around the world but they still got hacked. It might even be a problem with the programming language you are using (rmb mass assignment on ROR?)

"We offer people an off-site backup at the cost of trusting a third party with their password."

Yes, this is my main point. People have to learn that they shouldn't be giving out passwords to just about anybody.

I think this guy in the comments here (http://blog.geeksphere.net/2012/09/27/response-to-dropmyemai...) made a pretty good point. Maybe you might want to answer his doubts there?


I fail to see the point made by that commenter that has not been made yet in this thread, other than the funny accusation of malice. We don't store plaintext passwords, and we are very aware of mass assignment bugs. (being suspected of such naive practices is why I mentioned the incompetence thing earlier). If security is a chain, then we strive not to be the weakest link. People have to learn what's the risk involved in giving out their password, how to evaluate who they give it to, and then make their own choice regarding whether they want to give it away or not. I get my hopes high when I read that you wouldn't mind people giving their password to a company that is better than 'just about anybody'. Convincing people that we are trustworthy was a big initial challenge for us, and still is as we reach out to more and more users.


yea, you are now aware of the mass assignment bugs, but what about previously? even github got affected by it. are you saying that they are incompetent? what about bugs that have yet to be revealed?

what i am saying is that there may be some things that you forget about, because we are all humans. and in order to mitigate the risk from us being humans, we should not store passwords in a way that is easily recovered.


Have you stopped beating your wife? Are you now aware of the mass assignment bugs?

Aside from the fallacy, it is a false argument to pose all risk as bad. Given what is presumed to be your idea of acceptable risk, I would expect you to surf the net behind 7 proxies: http://knowyourmeme.com/memes/good-luck-im-behind-7-proxies


You're repeating yourself now, do remember that all systems are built by humans, and as far as encryption goes do remember that unless your email is encrypted on the server using a password requested from you in order to encrypt and decrypt it every time you read it, then you are not safe. We are professionals offering a professional service. And FYI, Rails developers have been aware of mass assignment bugs a long time before github got bitten.


Oh come on.

IFTTT does the same exact thing for some of their "connectors" services. Maybe you should go after them to.

Where IFTTT fails is that they have not IMO adequately explained just how they store these passwords.

http://www.quora.com/How-does-ifttt-securely-store-passwords...

Don't just read some web article talking about "always hash passwords" and repeat it as mantra. This is good practice for 90% of the time but there are definite use cases where having reversible encryption of passwords is necessary.


so you do concede that it can get ugly really fast.


I "concede" that they are doing nothing wrong and you are way out of your depth here.

I strongly suggest that you drop this before digging yourself an even deeper hole in front of the people following this from Twitter.


That's a value judgement you have to make, similarly to using any service hosted by someone else.

1) Is the potential loss of privacy worth the advantages of the service?

2) Do you trust the company providing the service?

3) Could you do a more secure job of it than the company?

It's not a service I would personally use, but I have no reason to think the company providing the service doesn't know what they are doing.


in fact, seeing how your account was created to post that comment and seeing how it doesn't make sense, i would suspect that you actually work for them.


Everything he said makes perfect sense and I agree with it. A brief look at my HN profile should tell you I don't work for them. (Never heard of them before in fact.)

I think that you are practicing cargo cult security -- you're doing a cargo dance here over password storage mechanisms in a case where it doesn't apply.


how does it not apply?



I don't post on HN often, and forgot the username I used last time I posted. I don't work for them.

Personally, I don't see a strong use-case for the product and it wouldn't be something I'd be interested in.

If I did work for them, I would happily mention it in a post.


I'm the author.

1) The app downloads your emails into their server.

2) Yes, they store that actual password. Which is ridiculous.

3) Yes, good for them for that, but still there are others where they store passwords. And that is not acceptable.

4) But that also means that they outsource the security part of things. Which doesn't lend faith to the idea that they know about security. And if someone realises how to control their application, all the passwords will be hacked.

5) Pidgin is stored locally. There's a difference. Not that I support it, but it's still better than someone storing my passwords.


> The app downloads your emails into their server.

They need to do that to back up the emails. The product may not be something you are interested in, but it doesn't mean the execution is flawed.

> Yes, they store that actual password. Which is ridiculous.

They have to in order to retrieve the emails. Blame the standards!

> Yes, good for them for that, but still there are others where they store passwords. And that is not acceptable.

See above

> But that also means that they outsource the security part of things.

> Which doesn't lend faith to the idea that they know about security.

> And if someone realises how to control their application, all the passwords will be hacked.

This isn't something with a black and white answer and I respect your opinion on this. I personally feel that they may know plenty about security and have decided that this is the most secure option. For example, I wouldn't write my own crypto, because I know enough about security to know how hard it is to do right.


How do you recommend that they regularly backup a user's email messages without storing that user's login credentials for that email service?


they can't, unless the email service gives them oauth.

and even then allowing a 3rd party to backup your emails is a very dangerous thing to do. they say that credit card is more dangerous, i say no. for credit cards you can claim fraud.

when your email gets hacked, potentially your whole digital life is gone


Then what you need to write is, "I think that unproven email backup services are a bad idea", not, "these guys are idiots because they store a retrievable copy of your email credentials" which is necessary for the service that they are providing.


what they could have done is to allow users to autoforward their emails over to their servers or something. not impossible, but i'm not their employee and i'm not responsible for thinking up business strategies for them.

so yea. not necessary


You can only archive incoming e-mails via autoforward, not drafts and not outgoing email (unless you use their mailservers, which is something completely different). If I want archiving for my e-mails, I have to give up my account credentials. You could actually do sufficient mischief with the archived e-mails, you don't need the account credentials in the first place. That sucks, but it's not their fault, this kind of service is inherently insecure.

Now, if you can demonstrate that this particular company has a particularly unsafe way of storing the passwords or the retrieved e-mails, then you're getting closer to having a valid point.


So what you're saying is that they should limit their market to those users that can successfully set up email forwarding, solely because storing passwords is bad.

Part of the service they're offering is that they'll restore the contents of your mailbox in case of accidental or malicious deletion. I have

    mail:/var/mail/associatedtechs.com/rob@associatedtechs.com# find . | wc -l
    24846
...almost 25,000 messages in my mailbox. How do you recommend that they restore 25,000 messages to my mailbox without my account credentials?


and by storing the passwords, they are putting their users at risk. and we are in an era where email security means more than anything. it means access to all your services.

they should go think about how they can design a service securely before offering it.


your argument is similar to: "it is impossible to design a bank that can be kept 100% secure from bank robbers, therefore we shouldn't use banks"


thanks, we have started to enforce it alr :)


here's another good place, altho more of culture rather than the technical stuff.

http://nushackers.org/2011/03/movies-documentaries-and-video...


ok, i'm not from the US, and I don't really know what's this 'good energy' you're talking about. Care to explain?


The cultural movement is sometimes called "new age" and is associated with portions of the hippy movement of the 60s, particularly those that fetishized or otherwise adopted Hindu and Buddhist mysticism.

The energy she speaks of is somewhere between "ya know, like, energy" and this sort of thing: http://en.wikipedia.org/wiki/Energy_(esotericism).

Yeah, it sounds a bit crazy, but its a market. Having been around this kind of person a bit, I can tell you they'd drop money on air from somewhere pure. A hundred bucks or more is too high, but cut that to $20-$100 and you could at least pull off a decent lifestyle business in the right part of the country, especially with a personality like her's.

Judging by the landing page, she's not just an airhead. If she can get the message out and get online orders flowing, it could be a decent chunk of change per month.

It's not gonna be the next Twitter, but it would probably pay for itself in a few years if you paid for her and a couple of her friends to go on some air gathering expeditions.


but they actually listened to her all the way, and as one comment said, some sites claimed that she might already have gotten funding.


Okay. The last part is really bothering me.


the funny thing is that she thinks vintage air sells.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: