Worked at a newspaper for a few years.
With very few exceptions, they do not give a fuck about you or the news. The advertisers are their customers and your attention is their product.
1) Be nice and; have fun
Doxxing, trolling, sealioning, racism, and toxicity are not welcomed in AskLemmy. Remember what your mother said: if you can't say something nice, don't say anything at all. In addition, the site-wide Lemmy.world terms of service also apply here. Please familiarize yourself with them
2) All posts must end with a '?'
This is sort of like Jeopardy. Please phrase all post titles in the form of a proper question ending with ?
3) No spam
Please do not flood the community with nonsense. Actual suspected spammers will be banned on site. No astroturfing.
4) NSFW is okay, within reason
Just remember to tag posts with either a content warning or a [NSFW] tag. Overtly sexual posts are not allowed, please direct them to either !asklemmyafterdark@lemmy.world or !asklemmynsfw@lemmynsfw.com.
NSFW comments should be restricted to posts tagged [NSFW].
5) This is not a support community.
It is not a place for 'how do I?', type questions.
If you have any questions regarding the site itself or would like to report a community, please direct them to Lemmy.world Support or email info@lemmy.world. For other questions check our partnered communities list, or use the search function.
6) No US Politics.
Please don't post about current US Politics. If you need to do this, try !politicaldiscussion@lemmy.world or !askusa@discuss.online
Reminder: The terms of service apply here too.
Logo design credit goes to: tubbadu
Worked at a newspaper for a few years.
With very few exceptions, they do not give a fuck about you or the news. The advertisers are their customers and your attention is their product.
This local single location grocery store by my house would unwrap and rewrap meat packages when it hit expiration dates in order to generate a new label with a new expiration date. If the meat looked bad, it would be added to the meat grinder to make ground beef.
At Disneyland, Mickey Mouse is always played by a woman, due to the small costume. So if you put your arm around him for a photo, try not to accidentally touch Mickey’s boobs.
I worked for an online payment company you all know. Many eployees have access to the main DB which holds all transactions and names and everything in clear text. You could basically find out all PII (personal identification information) of any celebrity you wanted given they had anaccount. Address, phone number, credit card and all. If you knew a bit of SQL you could basically find whoever person you wanted and get purchase history and all.
Cant say I didnt use this to find stuff about my exes or various celebrities.
I want this to be paypal. Can you expose this publicly and make this company bankrupt + closed by justice?
Im afraid they have the means to expose / dox my username if they really wanted
Definitely not worth your professional career to leak that. Weren't there coworkers that called this out though? I can't imagine a single competent dev not freaking out immediately after discovering that.
Cashapp, if I had to guess.
Either Cashapp or PayPal I think
I worked at an ISP. The DHCP server we use for our DSL offering was made in the 90s and hasn't been updated since.
Frankly, I don't see this a a problem as long as the software is up to date and the hardware is sound. I bet there are thousands of SPARC servers out there processing data 24/7 since 1995.
I've worked for a few of the larger ISPs in the US. They all have their own special weird shit like a windows NT machine shoved in a corner in a CO in west Texas that you have to remote desktop into and run some java applet from the 90 to log into a hardwired machine from the 70s just to set up a voicemail box for a phone line. Ain't broke don't fix it leads to some wild setups at companies you wouldn't expect it from.
An AI company... They used to manually change system event logs to show it wasn't their software that caused the downtime for our clients.
Bought over a million dollars worth hardware (25% of which didn't even got racked), over 200 46inch LED screens that no one used, and very expensive offices at posh locations in the bid to increase its IPO valuation.
Also, this unicorn that rhymes with Infinity, has all it's database service accounts with.... Drum roll.... "Password1". And most of the other secret service accounts and the passwords reside on company wide accessible Atlassian Confluence.
Pro tip: "Password1!" has a capital letter, a number, and punctuation, making it "totally 110% secure (tm)" according to the usual password complexity rules.
A certain fruit company knows about you WAY more than you can imagine, and most of the information is accessible to even the lowest ranks of support. And yeah, my NDA is finally over.
When you say fruit company, do you mean Apple or Chiquita?
Is it time to update the banana wars wiki page?
The iCloud support app? I’ll say it if you won’t. Apple needs to be shamed into doing something about that
Why is everyone here afraid to name the companies?
Unless you're sharing something that only you would know and the company is aware that you're the only one who knows it, there's no way they can identify you.
Something tells me the people posting here who had "NDAs" didn't actually have any sort of a high level clearance to important information.
It's a bold assumption that you will never dox yourself or be doxed. The fediverse by nature not at all private.
People are scared to death to talk about their company publicly because we are trained to have that fear.
It's pretty wild how ingrained it can be and how much power it gives the company to do whatever they want with no fear of consequences.
The building, used by several hundred employees, had a security systems with 4-digit codes. I've been part of group of people who liked to work late times, and the building would lock at midnight -- the box by the door would start beeping and you would need to unlock it within a minute or so, or "proper alarm" would ensue.
However, to unlock the alarm you did not need your card -- all you needed to do was to enter any valid code. Guess what was the chance that, say, 1234
was someone's valid code? Yes.
We've been all using some poor guy's code 1234
, and after several years, when he left the company we just guessed some other obvious code (4321
) and kept using that.
By the way, after entering the code to the box by the door, it would shortly display name of the person whom the code "belonged" to. One of our colleagues took it as a personal secret project to slowly go through all 10000 possible codes and collect the names of the people, just for the kick of it.
(By the way, I don't work for that company anymore, and more importantly, the company does not use that building anymore, so don't get any ideas! 🙃 )
The majority of tech startups are super chaotic and barely keeping things running. More than you would ever imagine.
A national (not US) cake company uses expired ingredients because it's cheaper. Yes, I did report them to the authorities.
gigachad
You did a great job, OP.
And nothing happened after you reported them I assume?
AFAIK they did get a couple visits from sanitary inspectors, but I haven't been in contact since.
Not strictly a company secret, but I had to sign an NDA for it, because... reasons.
I used to work for a massive conglomerate, these guys are making from components for satellites and tank to rubber gloves for hospitals, and everything in between. My job was to help the company implement regulations, work with auditors and generally follow product specific rules.
So I was on these 2 New Product Development teams and because the products needed some very specific testing equipment, we started working with local authorities and some contractors to build the testing station in the future factory. We drafted plans, prepare documents, we had an auditor come and see the place, the contractor came and checked what he needed to do, everything was going according to plan.
While all of this was happening, I was on a separate project where we were working on closing down the above mentioned factory.
An European Country stores citizens' critical data in vulnerable databases, whose password is in HaveIBeenPwned, on a VPN whose certificates are stored in random NASs. The IT guys don't know how encryption and certificates work and I wouldn't be surprised if everything was in some adversary countries' hands
S&P and Moody's were collaborating since at least 2000 on the pricing of the so-called "esoteric" structured instruments associated with mortgaged-backed securities that caused the 4Q07 crash. They collaborated via the competitive intelligence firm Washington Information Group (which does not seem to be around anymore.) The collaboration was almost certainly illegal (IANAL). They did this because neither wanted a price war when rating these. I did sign an NDA with S&P that kept me out of the industry for two years. I left the industry shortly after that and went back to what I used to do.
The first steel mill I worked for, the test requirements were more of a suggestion than a rigid specification. I, a trained and skilled engineer with the capacity to make informed decisions, had to run all rejections by my boss who would tell me "it's close enough" even if it wasn't. Sometimes it bit us in the ass with warranty failures, but the warranties were probably cheaper than internal rejections (and what is brand perception worth?).
My second steel mill job, I was the one making the rejection decisions. I did the hard thing and rejected our failures but I also troubleshot them to prevent recurrence, making our product and capability better over time.
It very much matters who you buy your steel from; two mills can have vastly different performance for the same products based on how they handle these situations.
I work in IT. Most systems have laughable security. Passwords are often saved in plain text in scripts or config files. I went to a site to help out a very large provincial governmental organization move some data out of one system and into another. They sat me down with a loaner laptop and the guy logged me into his user account on the server. When I asked for escalated privileges, he told me he'd go get someone who knew the service account passwords.
After a few minutes, I started poking around on my own... And had administrative access within an hour. I could read the database (raw data), access documents, start and stop the software, plus, figured out how to get into the upstream system that fed data to this server... I was working on figuring out the software's admin password when the guy came back. I'm sure that given some more time, I could have rooted the box because the OS hadn't been updated in years.
the guy logged me into his user account
It's pretty common to have this as the only barrier. If someone got into my work PC they could easily take down a lot of critical infrastructure, if they knew where to look.
Terrible, but common.
I work as a pentester and Red Teamer, I can attest that even for some large companies, you always stumble upon something that's just dumb, and completely renders their multi-million investment they are probably making into security tools and solutions worthless.
Having worked network support, the number of times I've been on a screen share with someone who opens an excel sheet from the share drive that holds all the root passwords for every network device they own is high. A bad actor could take down some very large companies with some simple social engineering skills.
I used to work at Starbucks (almost a decade ago now), but at the time, the motto was "just say yes" to any customer requests. We also had free drink cards that you could give out to deesclate any issue. So I would say any time you're even the slightest bit unhappy, bring it up, and you should at least have your problem solved, if not compensated for a free drink next time.
We also had customer satisfaction surveys that would print on reciepts, where filling one out would get the customer a free drink. We always kept them for customers that were happier to try and rig the odds in our favour of a higher rating, but also if a customer asked for one, I would give it if I had it. You could always ask the cashier if they have any of those as well.
Again, not sure how much either of those things have changed in the past 10 years, and I'm not sure how regional it was (this was in Canada at a corporately run store), but maybe worth a try.
Also I love these types of threads -- great topic to post.
Worked in tech support for a major internet provider. We would constantly have major ouages in various locations due to overtaxed systems going down. Corporate refused to allow us to admit that there were problems on our end and forced the techs to troubleshoot the customer calls, even though we all knew that we could do nothing for the customer. Saw multiple techs releived of their job for telling the truth to the customers. So many hours wasted on both the customer and techs part.
I worked for lumber liquidators, and their point of sale software seemed to be surplus navy because if you dug deep enough you could order nuclear sub parts.
Worked support for an electricity supplier. I was able to see a frightening amount of info about the customers. Even past ones who had moved elsewhere.
We also kept notes about each call, email, web or app chat. So if you were an asshole in the past, everyone will know going forward.
Also fuck landlords and landladies etc. More often than not, they were shitty to deal with.
Also we would often use Google Maps and Streetview to see what your house looked like. We also had pictures of the inside because the installation techs took pictures to confirm that works were completed as specified.
Alll of this was available to us for any reason, at any time with no oversight. And none of it was encrypted. There was also government websites in use up to 2020 that required internet explorer to use and had passwords as trivial as 'Password1'.
I left that job because the pay was lousy and the stress was pretty full on. I respected a lot of people that worked there. Both higher ups and people who came after me. But fuck was there a lot of potential for bad actors or like stalkers etc to mess with your info.
I would reccomend to everyone. Please use password managers. Especially decent open source ones like Bitwarden. Take note of every piece of info that you give a company. From your phone number, address, email etc to even when you contacted them. Also try to not have your home look like an abandoned hovel on Streetview lol. Easier said than done I know. But it may affect your dealings with support people that you need help from. And lastly, please dont use Password1 as a login. Ever. Like please.
That I made their DropBox account, and they can't access it anymore..
I don't have any interesting secrets or facts from my current ex-jobs, so I'll share an interesting fact from a buddy's. It's one of those companies that offers automated phone systems (and chats, nowadays) that listen to your options rather than taking number inputs.
This may no longer be the case, but these systems were not actually automated. There are entire call centers dedicated to these phone systems, whereby an operator listens to your call snippet and manually selects the next option in the phone tree, or transcribes your input.
I wouldn't be surprised at all if advances in AI have made this whole song and dance less in need of human intervention, but once upon a time, your call wasn't truly automated - it was federated.
I used to work at a hotel and they never changed the duvet covers guest to guest, only the other sheets.
Back when I managed a Blockbuster Video, most stores ran at a loss thanks to theft.
The real reason most stores failed wasn't because DVDs were going out. It was because we couldn't stem the flow of money out the door thanks to thieves.
I worked as software engineer and my boss tolerated me going to office at 2pm and leave at 9pm. It's against company policy, certainly, but no one talked about it. It still is my most productive and happy time.
This comment is not like the others, lol.
Good on your manager.