this post was submitted on 08 Oct 2025
778 points (99.2% liked)
Technology
75963 readers
3102 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
The fact that these photos and PII (personally identifiable information) were not destroyed after the verification process was certified is absolutely atrocious OpSec. I don't even care which of the two companies is ultimately responsible, because they are both responsible.
I work in IT, and treat PII like it's dangerously radioactive, because in the digital world, it really is.
That's because you have ethics
"Apparently" only those who were challenging the verification results and uploaded awaiting reverification are affected.
Not that that isn't bad enough
That's even worse, in my eyes. Maybe not in scale, but when appeal process is more vulnerable, that seems very questionable.
Yea, pretty sure most of the evidence is no longer ther
Me when I get a request for PII pertaining to a suspected corruption case: Have one of our corporate lawyers give me a written and explicit statement of what data I'm supposed to send to whom or get bent. I'm not touching that with a ten foot pole and gloves unless I have a legally solid affirmation that what I'm doing won't come back to bite me, and that our workers' council knows about it and will back me up.
I'm reluctant to even confirm that I can get that information in the first place. I mean, I'm the one with full access to the audit tool, so I probably do, but I'd have to access that data in the first place to check. I don't think that anyone would notice or care so long as I don't share that information, but as you said: dangerously radioactive; don't touch if I can help it.
Right. It blows me away the required training we have to do for physical files more secured than Fort Knox! Tech world? Eh just throw it in the recycle bin
I agree completely its moronic, but I do imagine the law requires it