Connect with us

Technology

Is Blind still safe for Silicon Valley secrets?

Published

on

Not so blind after all.
Not so blind after all.

Image: MASHABLE/CHRISTOPHER MINESES

It’s a bad day for would-be tech watchdogs and gossips.

The tech industry whistleblower and survey site Blind temporarily exposed user data when it left a server functioning without password protection. That’s according to TechCrunch, whose new report not only uncovered the server lapse, but also called into question Blind’s claims of privacy and complete user anonymity. 

A South Korean company, Blind is a site that allows tech industry employees to anonymously discuss their companies with colleagues. It also regularly produces surveys about sensitive topics like workplace harassment and diversity that it then distributes to the press. Blind gained prominence when discussions on the platform exposed sexual harassment at Uber. According to TechCrunch, it just secured $10 million in a new round of funding.

Central to Blind’s functioning are its claims of privacy and user anonymity. Without this assurance, employees would likely feel uncomfortable discussing their employers. 

The unprotected server reportedly showed logins, messages, and interactions,”allowing anyone to read private comments and posts.” 

Blind responded to the report saying that the unprotected server was an isolated incident that affected users who logged in between Nov. 1 and Dec. 19. The company reportedly emailed users about the breach after TechCrunch’s inquiries.

“While developing an internal tool to improve our service for our users, we became aware of an error that exposed user data,” Blind wrote.

In addition to account activity, Blind protects its users by disassociating work email addresses from accounts. Blind says that it does not store email addresses, and only creates unique tokens from emails once you sign up. 

“Email verification is safe, as our patented infrastructure is set up so that all user account and activity information is completely disconnected from the email verification process,” a Blind FAQ reads. “It is impossible to match your user activity to any profile or email information provided upon sign up.”

Despite these claims, TechCrunch was able to view emails of Blind users who had not yet posted. The server also contained pairings of these accounts with their unique member IDs, which could reportedly allow for identification if they did post in the future. The report also showed potentially shoddy encryption work for passwords and user tokens.

The server lapse is a potentially huge breach of trust for Blind users. Blind has the potential to be an important whistle-blowing tool for an industry that certainly needs oversight. But without confidence in its security, its users, and its power, could vanish.

Https%3a%2f%2fblueprint api production.s3.amazonaws.com%2fuploads%2fvideo uploaders%2fdistribution thumb%2fimage%2f3147%2f8aa38c87 f465 4aea 9ecb 009845271029

!function(f,b,e,v,n,t,s){if(f.fbq)return;n=f.fbq=function(){n.callMethod?
n.callMethod.apply(n,arguments):n.queue.push(arguments)};if(!f._fbq)f._fbq=n;
n.push=n;n.loaded=!0;n.version=’2.0′;n.queue=[];t=b.createElement(e);t.async=!0;
t.src=v;s=b.getElementsByTagName(e)[0];s.parentNode.insertBefore(t,s)}(window,
document,’script’,’https://connect.facebook.net/en_US/fbevents.js’);
fbq(‘init’, ‘1453039084979896’);
if (window._geo == ‘GB’) {
fbq(‘init’, ‘322220058389212’);
}

if (window.mashKit) {
mashKit.gdpr.trackerFactory(function() {
fbq(‘track’, “PageView”);
}).render();
}

Continue Reading
Advertisement Find your dream job

Trending