Okay, I'm getting tired of people sending me IMs from screennames that I have never heard from before that say "Hi, this is so and so. This is my new screen name!"
I do not reply to such messages. Period. Why? Because it is WAY too easy to engage in Social Engineering. Social Engineering is also known as the art of bullshitting people to get information out of them. Heck, Kevin Mitnick did a great job of getting into systems that he wasn't supposed to be in simply by using social engineering.
Then there is this recent case where a basketball player from USC was duped into thinking that he was talking to a student from UCLA named "Victora" who said she wanted to party with him. Imagine the look of surprise on his face at the subsequent basketball where people in stands held signs with his phone number and passed out copies of chatlogs.
Remember: trust, but verify.
I do not reply to such messages. Period. Why? Because it is WAY too easy to engage in Social Engineering. Social Engineering is also known as the art of bullshitting people to get information out of them. Heck, Kevin Mitnick did a great job of getting into systems that he wasn't supposed to be in simply by using social engineering.
Then there is this recent case where a basketball player from USC was duped into thinking that he was talking to a student from UCLA named "Victora" who said she wanted to party with him. Imagine the look of surprise on his face at the subsequent basketball where people in stands held signs with his phone number and passed out copies of chatlogs.
Remember: trust, but verify.
(no subject)
Date: 2006-03-17 01:56 am (UTC)Hi, this is Eddie Vedder over in Accounting.
Date: 2006-03-17 02:17 am (UTC)(no subject)
Date: 2006-03-17 02:17 am (UTC)It's kinda hard when you've never met met someone in person to be able to verify that a certain screenname belongs to them, of course. The next best thing you can do online is to have a web of turst. Either verify someone's screename/email address through a friend that you trust, or check their LiveJournal or website for a match.
So... if someone IMs me and I Google for their screenname and find their LJ, I now know that the screenname is tied to their LJ. I can then look through their LJ to try and learn more about them, and maybe look at their friends list to see if they know anyone I know.
I dunno if you ever used the command line versions of PGP or GnuPG, but they had a some great web of trust features for keeping track of keys, who signed them, etc.
Re: Hi, this is Eddie Vedder over in Accounting.
Date: 2006-03-17 02:18 am (UTC)(no subject)
Date: 2006-03-17 02:35 am (UTC)(no subject)
Date: 2006-03-17 02:37 am (UTC)On a different note, I've done the social engineering thing in the past, too. Not for malicious purposes, but to wiggle up the ladder and talk to the right person to solve problems that front-line customer service folks have no clue on how to.
(no subject)
Date: 2006-03-17 11:24 am (UTC)(no subject)
Date: 2006-03-17 01:37 pm (UTC)I'm pretty trusting, but I keep in tune to convienient coincodences like that.
(no subject)
Date: 2006-03-18 11:44 pm (UTC)(no subject)
Date: 2006-03-23 04:27 am (UTC)(no subject)
Date: 2006-03-23 02:48 pm (UTC)