• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

T-Mobile, unauthorized data capture and updates to the official word

September 19, 2018 by Steve Pote 1 Comment

I get to hang out with some very clever cryptographers at a bar about once a month. They make math-y jokes over my head, but demonstrate that best case is a stalemate where data is no longer significant before it’s encryption theme has become significantly penetrable.

T-Mobile announced an unauthorized capture of data. The updates paint a picture almost as disturbing as the loss itself in that they show either a misunderstanding or a ~careful wording to diminish verbal impact~, followed by better disclosure.

Here are a few that stood out for ~beer spit-take~ potential with the cryptography nerds;

“Because they weren’t [compromised]. They were encrypted.”

“may have included one or more of the following: name, billing zip code, phone number, email address, account number and account type (prepaid or postpaid).”

“about” or “slightly less than” 3% of its 77 million customers.” …so about …2 million…

https://motherboard.vice.com/en_us/article/a3qpk5/t-mobile-hack-data-breach-api-customer-data

https://www.t-mobile.com/customers/6305378821

Filed Under: Week 03: Reconnaisance Tagged With:

Reader Interactions

Comments

  1. Nishit Darade says

    October 10, 2018 at 1:01 pm

    Being a T-Mobile service user scares me now. Hope i am not one of the affected user. There press release was comforting at first then they walked back on there word and all the confidence in their encryption process . Thanks for the heads up!

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (14)
  • Week 01: Overview (7)
  • Week 02: TCP/IP and Network Architecture (18)
  • Week 03: Reconnaisance (17)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (17)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (15)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (15)
  • Week 12: Web Services (25)
  • Week 13: Evasion Techniques (8)
  • Week 14: Review of all topics (15)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in