Thomas, Gregory, (December 12, 2020), Cascadialegends.wordpress.com
Your passwords are useless. Because the bandits hack the king, and bypass the commoners.
This is because regardless of how “strong” it is, how many numbers and special characters you implement, the hackers of today are not living by a ‘dictionary attack’ method of hacking and stealing data (Ostrowick, John).
Dictionary attacks usually involve software or tool that attempts to go down each letter or word of the alphabet, systematically attempting to match a password case. If the program finds that an ‘A’ is in your password, then it will remember that A in the place it found it, then continue to match cases until it discovers your password.
Hackers have stronger tools to use other than this method, this is what large companies such as Windows and Amazon won’t tell you, and the FBI know this, but won’t tell you either.
Instead, a hacker will hack directly the database itself, which holds everybody’s information that has been stored on the cloud. The cloud is virtually impossible to keep from being compromised, because what happens in the cloud, stays in the cloud.
Under the illusion of control, big names such as Windows, Apple, Amazon, etc. will heavily force their customers to create a strong password, usually about eight characters long, with certain requirements that are needed in order to progress further (in example, even though the password: “!wEi8?aZ” took a long time to come up with, the page will not let you progress, if it requires three numbers to be used). This becomes even moreso tedious should a large company force longer passwords, such as a ten or twelve case letter. For the older generation, such as Baby Boomers, it is extremely difficult for them to progress further–even if they have over one million dollars in their pocket, being only human just like the rest of us the upper class also struggles greatly to maintain password security without the fustration of forced fixed passwords.
In fact, due to whaling and phishing hacking attacks (whaling is when a hacker masquerade as an upper level access employer, and cyphor sensitive information, usually through emails; phising is extremely popular in this day and age, and involves scammers trying to get unsuspecting users to release sensitive information, or click fraudulent links) (kaspersky.com) (consumer.ftc.gov).
Not going too much into the ins and outs of the two hacking atttempts, here are some things that you should know. Your uncle, Gregory Thomas here will tell you info big names will hide from you.
Regardless if you have no password or a strong password, hackers don’t need to guess your password.
Your information is stored in the cloud, which can be accessed via stolen data. This data comes not from you, but from the company itself. Like robbing a bank why do I rob an ATM, when the bank, if I am successful and if it’s illegal, will have more to offer?
Once data has been stolen from a company, all of their customer’s information (including your ‘strong passwords’) can be found at the source. This is the frailty of the cloud, and cannot be avoided.
This is why, the internet within itself, is virtually out-of-date, and needs to be upgraded.
More on that, mostly what’s important is maintaining data integrity. You can see many big names, such as Donald Trump, and Elon Musk, usually frequent Twitter, Facebook, etc. As a cardinal rule, I can say that what they do is highly unethical, do to the risk for compromise in security. The head of a company should always reframe from exposing the information of a social media platform. Though as rich as Elon is, its very clear that as a professional, he is inadequete to maintain security properly, is highly unethical, and engages in very risky behavior that can not only compromise his entire company, but lead him at risk of retaliation from hostile activist groups.
According to Melanie Kaidan from express.co.uk, Elon’s twitter rants even cross the dangerous boundaries of politics, where his responses sparked controversy; posting imagery appearing to mock preffered pronouns centered around profile descriptions (Kaidan, Melanie). Though as harmless as it may seem, Elon Musk shouldn’t even be maintaining a regular presence on the website, due to the risk of damaging reputation, integrity, and potentially compromising the security of the company. Nobody should know his political beliefs, or his stance on transgenders. This was just one of many times Elon has stirred controversy for his company, and though he stands as a billionare, you have to remember that attacks from countries such as Iran can cripple his profit, hacks are known to cause billion dollars of damage in a matter of minutes.
Instead, head CEOs should keep their conversations yay, yay, nay, nay, have representatives speak for them, and respond only when it is neccessary. To Americans, some may believe that just because somebody is rich, they can’t be stopped. However, unbeknowst to them, the ability to steal data, block access to one’s own website, and sabotage one’s company is made easier due to the level of technology that a criminal can gain access to online. In fact if I may be so bold, I’d give Elon Musk about less than eight years before a major event in linked to security compromise, corruption, hacking, or activism cripple both his wealth status, and company’s momentum.
Again, repeat, your passwords (though a password is better than none) don’t matter, beacause of a hacker’s ability to go straight for the jugguler, and hack CEOs, corporations, and databases attached to the cloud. In fact, due to it’s tedium, it actually confuses the companies themselves, when you are unable to access your accounts due to you not knowing the answers to your own security questions; in one case I had with Amazon, I had forgotten my password, and so I had to know my debit card’s last four numbers in order to progress further…But the card they were using was an old and outdated card that I didn’t use anymore, and the only way to progress further was to call their tech support.
Ask yourself, why should another company be using your debit card for entry? These are things that you should reveal as little as possible, and it’s clear that the password situation is not only getting out of hand, but is losing it’s potency in the IT world.
References
dictionary attack, Ostrowick, John, Retrieved from URL:
https://searchsecurity.techtarget.com/definition/dictionary-attack#:~:text=A%20dictionary%20attack%20is%20a,encrypted%20message%20or%20document.
What is a Whaling Attack? Retrieved from URL:
https://www.kaspersky.com/resource-center/definitions/what-is-a-whaling-attack
How to Recognize and Avoid Phishing Scams, (2019). https://www.consumer.ftc.gov/articles/how-recognize-and-avoid-phishing-scams
Elon Musk sparks Twitter meltdown as SpaceX boss accused of sharing ‘transphobic’ meme, Kaidan, Melanie. (2020). Retrieved from URL:
https://www.express.co.uk/news/world/1372589/elon-musk-news-twitter-spacex-controversy-transphobia-grimes-lgbtq-ont