Back to News
Advertisement
Advertisement

⚡ Community Insights

Discussion Sentiment

42% Positive

Analyzed from 3676 words in the discussion.

Trending Topics

#government#data#don#information#number#security#more#agency#french#france

Discussion (103 Comments)Read Original on HackerNews

hk__2about 3 hours ago
> the data stolen in the breach could include full names, dates and places of birth, mailing and email addresses, and phone numbers on an undisclosed number of citizens

Nothing really new here sadly, this information about me have leaked half a dozen of times in the past 2-3 years or so. These things will never change if the only penalty the company/agency gets is "send a message to your users saying you are sorry and that it won’t happen again".

noutabout 2 hours ago
Or maybe the government should not require companies to KYC you for every little stupid thing or action you do in this world. What happened to requiring only the information that's actually required? Why do I need to be KYCd in the systems when buying banana, ordering delivery, etc.

Because of the inevitable breaches and leaks - KYC is the illicit activity. The selling point of KYC was preventing fraud and money laundering. It doesn't actually do that. Search for "largest money laundering settlements" and you will find 5 banks and one crypto scam.

traceroute6615 minutes ago
> Or maybe the government should not require companies to KYC you for every little stupid thing

Actually....

Say what you like about the French today, but one good thing they have is an electronic service[1] where you can generate single-use KYC ID:

    - That only discloses minimum information required
    - For a specific recipient organisation
    - For a specific duration
    - For a specific use-case by that organisation
More countries should provide this sort of KYC tool.

[1]https://france-identite.gouv.fr/usages/le-justificatif-d-ide...

michaelje30 minutes ago
The overreach on access and then storage will be a meaningful issue we will have to reckon with more and more. Companies are acquired, companies die. What happens to your data in 5, 15, 50 years? It doesn’t just disappear.

From a few months back: https://mjeggleton.com/blog/your-data-never-dies

MattDaEskimoabout 2 hours ago
Might be cheaper & safer to buy an identity than use my own.
concindsabout 2 hours ago
Penalties don't work for government agencies. Taxpayers would pay for it and it doesn't act as an incentive.

The way to fix it is to empower one government agency to do aggressive pentesting against every other agency, hospitals, banks, infrastructure, and big corporations, with salaries matching the private sector. Impose a legally-enforced deadline to fix any issues, with a fine (for private actors) or demotion of the guy in charge of infosec (for state agencies).

Forget compliance checklists, KPMG "audits" and all that crap, just have government-sponsored hackers trying to get into everything like an attacker would.

France seems to have had a ton of government hacks in the past year at various levels, so it's sorely needed.

mcmcmcabout 2 hours ago
> Penalties don't work for government agencies. Taxpayers would pay for it and it doesn't act as an incentive.

This is the same as the rogue police problem in the US. What needs to happen is a shift to personal liability for those responsible.

signatoremoabout 2 hours ago
Personal liability? Are you also against no blame culture that is prevalent in the tech world?
spwa4about 1 hour ago
You don't seem to realize the difference between those 2.

> The way to fix it is to empower one government agency to do aggressive pentesting against every other agency, hospitals, banks, infrastructure, and big corporations, with salaries matching the private sector. Impose ...

And now you've got private people empowered to attack specific government officials. In fact, that's their job. Btw: you forgot to specify "in public", and that needs to be how it works, otherwise it will just result in officials attacking this security agency. Oh, AND you're giving government officials an obvious point of attack: "salaries matching the private sector".

> Forget compliance checklists, KPMG "audits" and all that crap, just have government-sponsored hackers trying to get into everything like an attacker would.

You mean forget the way even the dumbest of the dumb can "provide security"? Do you think government officials in France got their position based on their IQ?

Of course this is the only way it can work, but this needs a very un-French form of government to get it to work.

xp84about 2 hours ago
Hey now, don’t forget the offer of “free credit monitoring for a year” - I feel like at this point I’ve gotten so many of those that if I signed up for them all, I’d have my personal info in twice as many probably-hackable locations as I do already.
throwup238about 3 hours ago
Wait, you don’t even get a month of free credit monitoring?
tcgvabout 2 hours ago
My full name, phone number, and address were leaked by TAP Air Portugal about five years ago, along with the details of my parents who were on the same booking. Since then, my dad has been targeted by those types of scams where a fraudster impersonates me to ask for money.

I never received a notification from TAP; I only found out a year later through my Google One security feature. I certainly didn't get an apology—much less a free travel ticket!

Brybryabout 2 hours ago
The world of today is so weird sometimes.

When I was a kid most adults' full name, phone number, and address were available for free in the phone book.

ghm2180about 2 hours ago
I do use an email alias everywhere. But I don't believe you can do the same with phone numbers. I tried using my twilio rented number and there is a way systems use to figure out if that is a real number for a person or a VoIP one. Though it is sometimes successful in use for signups and hence spam reduction.
tiagodabout 2 hours ago
That TAP data was leaked on a tor hidden service, in multiple files, and download was extremely slow on the days following the leak. One of the files was much smaller, and my friend had the bad luck to have his data in that one.

His phone was spammed so incessantly he had to change his number almost immediately.

VadimPRabout 2 hours ago
I'm dissatisfied about the TAP leak as well! I was affected, and like you, didn't even receive a notification - nevermind compensation for having leaked my personal data to the dark web enabling all sorts of shenanigans that make my personal life difficult.
lostloginabout 2 hours ago
> I never received a notification from TAP

They have been reporting millions in profits despite rising costs. What you propose would further elevate costs. Shareholders don’t want that.

gus_massaabout 2 hours ago
I'm not sure about France, but here in Argentina all this info is assumed to be public. If you want a credit at a bank or shop, they ask for a physical copy of the national ID [1], probably a photocopy too, an electricity or water bill and perhaps other paperwork that is hard to get (verified phone number???).

[1] Do you want my number? It's inside this list:

  for i in range(1E9):
    print (i)
jerfabout 2 hours ago
"Do you want my number? It's inside this list:"

You might find it interesting to learn a bit about information theory. The entire purpose of your specific number is precisely to identify which number in that list is yours. Having the list of all possible numbers is irrelevant. Conceptually you can model that as everyone has that, all the time. But that's not enough to do anything with, because having that list entire list means you have zero information.

If you say "it starts with an 8", you've eliminated 90% of the possibilities. Now you have log2(10) bits of information, but you haven't nailed it down yet. For each additional number you give you give that many more bits until you nail it down.

This is a common misconception people have. I remember someone who claimed to have copyright all possible melodies by virtue of having printed them out and thus enumerated them. But that is meaningless, because the entire job of naming a specific melody is precisely the nailing down of which one you mean. Expanding the list of possibilities you might mean is actually a reduction in the amount of information, despite the superficial appearance of listing more numbers out, and when you expand the possibilities out to "all possible instances of the thing" you're actually at the minimum of information, not the maximum.

vladvasiliuabout 2 hours ago
It's supposed to be identifying information here. Usually, you can just send copies of those documents, which means that if you're looking to impersonate someone, you can easily produce fakes. And since everyone and their grandmother asks for these, people don't bat an eye and send them.

The coup de grace of security in France is signatures, though. Now, since you can't produce a physical signature over the internet, they'll ask for your phone number and send you a text with a code. Once you've entered it on their web form, you've proved undoubtedly you are who you say you are.

dspillettabout 2 hours ago
> in Argentina all this info is assumed to be public

Same here. You can probably can find my address and phone numbers fairly easily from my name by a number of methods. That doesn't mean it isn't bad when an organisation spews out, or allows to be sucked out, huge numbers of people's data. With a leak like this it is practical to try scam everyone the list, searching for each person's details individually, and having to enumerate those people in the first place⁰, would mean no such attack would scale in a way to make it worthwhile bothering¹.

--------

[0] This seems strange when you first think it, but: the most important thing being on such a list says about you, is that you are a real existing person, whose identity could be exploited somehow. That fact is what makes any other information valuable.

[1] except for high-worth targets, which is why spear-phishing is a thing

Traubenfuchsabout 2 hours ago
If you are that unconcerned, why do you not provide us with your information right here and now?
Thaxllabout 2 hours ago
The credit system is not the same in Europe, first of all there is no such thing as credit rating and what not.

People don't have credit card like the one in US and Canada.

The vast majority use a debit card.

csnwebabout 1 hour ago
We do very much have credit rating in Germany, might be very different than the one in the US, don’t know theirs.
jampekkaabout 2 hours ago
In UK there is. :(
freedomben42 minutes ago
Heh, for real, it's maddening how often this is the "solution" to any breach. It's especially lovely when it comes from multiple companies at the same time, that may or may not have leaked your SSN.
dborehamabout 2 hours ago
Fairly sure this is an ironic comment. (Credit monitoring is the useless thing companies give people in the US when their information is leaked -- everyone in the industry knows it's laughably unrelated to private information disclosure).
sofixaabout 2 hours ago
There is no such thing in France (or most countries for that matter). It's a pretty absurd system that gamifies and profits off heuristics, and results in a Kafkaesque nightmare where you can't get a job, rent a place or get a loan because of an arbitrary value assigned by a company with a profit motive. One that has no incentive to get things right or even get the right person.

How things work in France is much simpler and better. When you apply for a loan, the lender checks with Banque de France (national bank) if you have outstanding debts and if you've defaulted on any debts in the past 5 years. That's it, that and your proof of revenue is all they need.

rectangabout 2 hours ago
Seeing another one of these breaches had me returning to look at local-first software. https://lofi.so

I feel like if we're going to make progress in preventing wholesale data breaches it will be through architectural innovations that attack the problem of why a trove of concentrated data needs to exist. Even if the government needs to be a central authority, are there ways to house the data that limit the blast radius?

I'm sure there are innumerable arguments why this can't help, but when the mainstream alternative is despair and helplessness, progress will be made in the margins.

isodevabout 2 hours ago
With everyone doing online “identity” verifications, all these details and more are already available to data brokers. Persona.. I mean Palantir even has a short video of you from your “liveness check” to go with the scan of your ID.
dawnerdabout 2 hours ago
The problem though is when its from a gov agency it validates previous breach data making it more valuable.
dylan604about 2 hours ago
Depends. According to DOGE, voter registration databases have people listed as 150 years old or deceased people receiving monthly government checks. Obviously a different govt than TFA, but govt databases are no less prone to inaccurate data. They are still run/managed by humans regardless of the govt in question
dawnerdabout 1 hour ago
That DOGE info was a very small portion of the data and considering who it came from you have to take even that with a grain of salt. There's always going to be inaccuracies in any dataset, no avoiding that.
Ales375about 2 hours ago
GDPR has solid fines for data breaches, but this doesn't work for government agencies. Just someone else's money going from one government pocket to another. What they need is an automatic firing of the head of the government agency that suffered a breach. No question asked.
a34729tabout 2 hours ago
I'd go for mandatory caning, on CSPAN
ge96about 2 hours ago
> Nothing really new here sadly

Facts at Equifax

reaperducerabout 1 hour ago
These things will never change if the only penalty the company/agency gets is "send a message to your users saying you are sorry and that it won’t happen again".

So, you want the French government to fine the French government so the French government uses French taxpayer money to pay the French government for the French government's mistake?

paulddraperabout 2 hours ago
> if the only penalty the company/agency gets

What is the penalty for the government?

ornornorabout 1 hour ago
Elon Musk
shevy-javaabout 2 hours ago
Not disagreeing with you, but:

> These things will never change if the only penalty the company/agency gets is

I do not think penalties can prevent these situations. Perhaps they may be less frequent; perhaps people would get more compensation, but ultimately I do not think these can be prevented. The first consideration is why the data has to be stored in the first place. Naturally one can say "the government needs to know who is a citizen and who is not", and I can understand this rationale to some extent, but even then I wonder whether this has to be correct. Perhaps we could have a global society without any requirement to be an identifiable citizen per se. Things such as mandatory age verification-sniffing to never become an issue, because it is not needed and not possible and nobody would have an addiction-need to sniff for that data (we know Meta and co want that data, this is why their lobbyists run rampage via the "but but but somebody protect the children" lie).

misiek083 minutes ago
- There was no leak - Here is sample data we stole

„Small, not harmful leak of non important data, few records only”

loupolabout 3 hours ago
I received the email telling me I am impacted today.

Ironically it changes nothing for me as that same data had already been leaked by the French government agency that handles unemployment benefits a couple years ago. Silly me had not bothered deleting that account even after it was no longer necessary due to finding a new job.

pixel_poppingabout 3 hours ago
A copy of it would be nice for record purpose (so Anthropic and OpenAI can have it in their dataset :))
rawgabbitabout 3 hours ago
It seems to me we must move away from worrying about ransomware, data breach, data protection as that ship has already sailed and everyone's PII has already been stolen. We should think of how to verify people's identities online (for things like government benefits etc). I have heard of the Dutch and the Japanese using national digital identity systems although I am unclear how they work. India is doing biometrics. I am curious what the US will eventually land on.
bdashdash5 minutes ago
In the Netherlands, there's a single ID you use for all official government services. It's essentially username/password with MFA, issued by the government. What is neat is you can scan your passports NFC chip with your smartphone as a means to verify your identity through this system.

Not sure how it solves any of the data breach issues, though.

afarah1about 3 hours ago
Biometrics is just something else to get leaked, terrible idea because it's even more sensitive (can be used to track you through cameras for example, like used in the Iran war).

This problem has long been solved with federated IdPs and MFA - something you own like OTP device/physical token besides something you know like SSN/tax id/password.

Most governments prefer biometrics of course because citizen privacy is the opposite of what they want.

whyagaindavidabout 2 hours ago
I would not go that far to say all govts are like that. The main problem is majority of citizens cannot easily remember such things. Even simple PIN that is included in EU ID cards - most people don't remember or use. people want frictionless use.
yladizabout 2 hours ago
> Most governments prefer biometrics of course because citizen privacy is the opposite of what they want.

Or... it's something that you always have on you which is incredibly hard to fake.

jerfabout 2 hours ago
You shouldn't model it as incredible hard to fake. It isn't. It's harder that typing a password you've stolen into a web site, but if you set out to do it, it's not that much harder.

This is the primary reason I'm against biometrics used for identity. Yeah, the privacy invasion is a problem, but I think that's completely dominated by the fact that if everyone uses it, it will be leaked, and once leaked, can indeed be quite practically faked. If used as a password, it's a password you can never change. That is useless.

The difficulty of overcoming a security measure should be greater in cost than the thing it is valuing. The cost of, for instance, replicating a fingerprint given a photo of it, is basically a home hobbyist project for the weekend. Check out Youtube for many people who have done exactly that and give instructions how. When the cost of bypass is "home hobbyist project on a weekend", the value of what it should be expected to protect is correspondingly low.

(In fact I don't even use it on my cell phone, with all its access to bank accounts and amazon accounts and other ways to spend my real money. The idea of a password to all that stuff that I leave arbitrary copies of sitting right on my screen is completely absurd. Everything important is locked behind codes and passwords. It's less convenient than fingerprints but at least those offer actual security.)

You also have to bear in mind the costs of the biometrics gathering. If you have a physical guard watching someone do a retinal scan and verifying that they have put their real eye up to it, you're at least on track to something that takes a lot of resources to overcome, especially if it's in combination with other techniques of identification. If you don't have that, now we're back to "how cheaply can we replicate whatever passes for a retina with this scanner" and that's likely to be cheaper than most people think. Real-world biometrics are in places where attackers can perform arbitrary attacks with impunity.

rawgabbitabout 2 hours ago
Maybe in the future, our driver licenses will become a physical token?
anonym29about 3 hours ago
Biometrics are the only credential you can't roll after compromise.
lostloginabout 2 hours ago
It depends what the biometrics are. There have been successful hand transplants, so new finger prints are possible, but completely impractical.

https://en.wikipedia.org/wiki/Hand_transplantation

tombrandisabout 2 hours ago
kind of but others are hard as well... most people don't change their name, date of birth or even email address when they are leaked.
artursapekabout 2 hours ago
this is exactly my problem with them
deltoidmaximusabout 3 hours ago
Based on how things are, I feel like the US solution is just going to end up with me requiring a retinal scan to buy pants from Target online and then that scan will end up on the dark web along with my voice print and a scan of a my driver's license.
sofixaabout 2 hours ago
> We should think of how to verify people's identities online

France already has that, in multiple ways.

There is the France Connect SSO, which is kind of a federated SSO. You need at least one account which is physically proven (it could be with the Post Office which send you a letter with a code to confirm your address and idenntity / ask you to physically come to a post office for an ID inspection; the tax authority where there are also multiple physical verification hoops, the social security system, same), and can use that via the SSO to authenticate to all government services.

Separately, there is an app proposed that scans your physical ID's NFC chip with your biomettrics, compares that to a selfie you take, and uses that identity to authenticate you to stuff.

tomjen3about 2 hours ago
I can make a new password, hard to get a new eyeball.
kleene_opabout 2 hours ago
I find it especially ironic that they would leak all my data, given the fact that they would ask of me to forward them every piece of id imaginable whenever I needed to forge or amend a new one (when adding a mention on my driver's license for instance).

Like they didn't have access to it anyway.

yladizabout 2 hours ago
They do have to prove who you are, and to do that you need to show your ID(s) and they need to check it in their system. I don't understand your comment.
kleene_opabout 2 hours ago
I already have to log to their website with 2 factor authentification. I had to walk and physically present my id card, install the numerical identity app. That should be enough.

Also, apart from reuploading IDs, they ask for information such as age, name, place of living, and a thousand more things that they already have and doesn't need to be provided to establish that you really are you.

agentultraabout 1 hour ago
There’s something to be said about old school bureaucratic institutions: it made breaches like this significantly more difficult to pull off and far less valuable as a result.

It also ensured democratic participation by all of the people employed there making sure that processes are followed and making sure no one is cheating.

We all knew that systems like this would get breached. It’s not a matter of, “if,” but, “when.” If we’re going to continue down this route because of convenience or surveillance and authoritarianism or whatever; people designing these systems need to thinking: When this system is breached…. And they should make sure there’s a good story for protecting people and the system from these sorts of events.

ameliusabout 2 hours ago
If governments are treating my personal data as if it is worth nothing, then I'm not going to treat copyrighted works as if they are worth something.

If you want to build a society on information, then you cannot forget the most important group.

AlecSchuelerabout 1 hour ago
Let us know how it works out. It's great in theory to stick to your principles but taking on the government in that way is almost certainly a losing battle. There are better ways to bring about change.
mixxit42 minutes ago
We are going to leak everything from our sexual health records to our HR files

It's the age of the leak and the sooner we accept, no matter our efforts, we live in a security free world and design around that - the better

dangabout 1 hour ago
ahigheruglinessabout 3 hours ago
19 millions de Français! Et moi, et moi, et moi.
hmokiguessabout 3 hours ago
C’est la vie.
Advertisement
duncanghabout 2 hours ago
It’s kind of interesting that this happens so shortly after they proudly announced how easily they would’ve able to migrate all systems from Microsoft and US firms. Maybe next year will be the year of the Linux desktop
_the_inflatorabout 3 hours ago
I trust Google more than any government with my data. One needs security to survive the other couldn’t care less.

Google selling data? So far no one came to blackmail me for certain dispositions, while the other does as they want, IRS, foreign governments, social security whatever.

Google can be sued while the other gives itself a pass.

Who is the baddie?

In Germany the administration put massive duties on IT providers and added punitive damage as a looming consequence.

Fast forward and the government with its “Ha, we are so digital!” and “Europe is better than US in CS!” suddenly has to swallow some brutal medicine I guess.

I stick to my guns: Silicon Valley and especially Google is art regarding code and CS evolution. Same for FAANG etc.

EU is hubris to say the least.

Every time someone says “Let’s build our own Google/Cloud/…” a penguin dies.

E Invoice will be a brutal boomerang, XRechnung the greatest backdoor of all times.

Your data, time to shift everything into the EU.

whyagaindavidabout 2 hours ago
I don't understand the downvotes. Literally every single German email provider took like 5 years to implement 2FA. Even now lots of security issues with many German providers that claim privacy. Even so-called DE-mail was sham. Still somehow people assume FAANG is crap in data security. (Yes, I am not demanding privacy from ANY MultiNational company)
ChrisArchitectabout 3 hours ago
cynicalpeaceabout 3 hours ago
A possible outcome of AI-assisted hacking is that companies, governments, and people become more resistant to using software, and software adoption actually declines.
AlecSchuelerabout 1 hour ago
I can see this happening as well. I'm extremely loathe to download or sign up or discuss anything online these days.
yubblegumabout 1 hour ago
This shit should be stored encrypted not in plaintext.
jonathanstrangeabout 1 hour ago
The attacker will then simply use the decryption key to decrypt it.
yubblegumabout 1 hour ago
Then the headline would be French goverment loses encryption keys ..
pembrookabout 2 hours ago
Important to remember: this is the competency level of basically all governments who are currently proposing you be required to identify yourself using their proprietary identity systems anytime you visit a website to "save the children."
shevy-javaabout 2 hours ago
Governments may just be incompetent. Still, the lobbyists will never give up for mandatory age verification in the future.
zh_codeabout 3 hours ago
Use Mythos!
SilverElfinabout 2 hours ago
Yet another example why NO ONE should trust age verification laws or companies like Anthropic forcing you to verify identity with shady companies like Persona (https://news.ycombinator.com/item?id=47872608). Whatever info you give up, it’ll be exposed one day.
Zealotuxabout 3 hours ago
Great, now scammers can steal my identity directly from the government. I hope they release a tool to check if I'm impacted or at least email me about it.
Avamanderabout 3 hours ago
Why would those pieces of data (DOB, full name, address) ever be sufficient for identity theft?

If that's sufficient to achieve anything then those systems are built on top of hopes and dreams.

rationalistabout 2 hours ago
It's good enough for health insurance fraud.

Edit: does someone not realize that many (all?) the doctors and hospitals use to verify you is your name and date of birth (in the U.S. - although I suppose that's why since this breach happened elsewhere)?

tomjen3about 2 hours ago
Because the world is run by people who don't know anything, but have to pretend they know everything, so they can't ask those of us who have some idea about how IT security works.
john_strinlaiabout 3 hours ago
>I hope they release a tool to check if I'm impacted or at least email me about it.

"ANTS stated that it is currently in the process of notifying those identified as impacted."

realusernameabout 3 hours ago
With the number of leaks the French administration had everywhere, you don't need a tool, you are guaranteed to be impacted.
psychoslaveabout 2 hours ago
"Our government successfully achieved wide distribution of valuable assets in the era of digital information."
doublerabbitabout 3 hours ago
Alternatively, hackers can now be used as a method of age identification.
Orasabout 3 hours ago
are govs required to comply with GDPR and data breaches laws?
nxmabout 3 hours ago
Yes, but unelected bureaucrats only impose fines on the private sector.
nick486about 2 hours ago
what would be the point of the government fining itself though?

Now that I'm thinking of it, it would create the need for an extra gaggle of bureaucrats to oversee the process,so I suppose someone might see a point to it ...

whyagaindavidabout 2 hours ago
Do you mean fines for tiny companies?
infamouscowabout 3 hours ago
There are carve-outs to allow for governments to make exceptions, but it's besides the point.

If the government were to hold themselves to account, they would fine themselves some amount N, and pay itself N using your taxes. It also wastes other finite resources for all the paperwork and legal action involved that could be used for something else.

Speaking pragmatically, there's no point trying to hold the government itself to it's own laws. The only time citizens do hold the government accountable, it's always done in the form of hangings, or the guillotine in France's case.

Advertisement