{"id":3670,"date":"2014-07-17T10:00:22","date_gmt":"2014-07-17T14:00:22","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=3670"},"modified":"2020-02-26T18:58:52","modified_gmt":"2020-02-26T14:58:52","slug":"reel-to-fb","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/reel-to-fb\/3670\/","title":{"rendered":"A tale of Facebook, reel-to-reel tapes and security"},"content":{"rendered":"<p>Do you consider the social networking world mature? Think again. Social networks are in their infancy. And we live through all the typical problems of any infant product or service. This means that in addition to some rough edges and overall complexity, the cost for a human error is very high, especially when it comes to security issues. Trust me \u2015 I know a lot about expensive security mistakes and even got some insights during my childhood. My father shared a great example.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05104705\/reel2reel.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5467\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/23102457\/reel2reel-2.png\" alt=\"reel2reel\" width=\"640\" height=\"480\"><\/a><\/p>\n<h2>The breach<\/h2>\n<p>It was 1980, my father held a bachelor party days before marrying my mom. He invited lots of friends to his apartment in the Russian countryside. To be more correct, it was the Soviet Union, not Russia at the time, and he could not invite everyone to a restaurant, because there were no restaurants out there. The party was loud, but the next day he discovered that half of his precious collection of music on <a href=\"http:\/\/en.wikipedia.org\/wiki\/Reel-to-reel\" target=\"_blank\" rel=\"noopener nofollow\">reel-to-reel tapes<\/a> had disappeared.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05102615\/reel2reel-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5469\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05111457\/reel2reel-1-1.png\" alt=\"reel2reel-1\" width=\"800\" height=\"512\"><\/a><\/p>\n<p style=\"text-align: center;\"><em>What a pathetic security breach!<\/em><\/p>\n<p>For those who are not familiar with the late Soviet Union era, let me indicate that the collection of about 600 hundred albums was worth a fortune. It simply could not be restored. In addition to monetary costs (an average monthly salary could buy about 15 <strong>blank<\/strong> tapes), this was a massive investment of time and effort.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05102614\/reel2reel-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5471\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/23102508\/reel2reel-2-1.jpg\" alt=\"reel2reel-2\" width=\"800\" height=\"623\"><\/a><\/p>\n<p>You had to carry your 25kg tape recorder to a larger nearby city, find people who trade foreign records, smuggled into the country by sailors lucky enough to be allowed to travel abroad. Foreign music was strictly forbidden by law, and listening to it was discouraged. So you had to make arrangements. Meet new people and obtain their trust. Spend a couple of days pirating records 24\/7. Take everything back home. Only then you could finally start listening to your favorite band like Deep Purple, ZZ Top or Queen.<\/p>\n<h2>The evolution<\/h2>\n<p>Despite the \u2018incident\u2019, the wedding itself was great, and some time later I was born. No wonder I like music a lot, too. In my youth, obtaining music became easier. But still complicated. It all started with cassette tapes. Then came the CDs, followed by computer-based MP3s.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05102612\/reel2reel-3.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5472\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/23102513\/reel2reel-3-1.jpg\" alt=\"reel2reel-3\" width=\"800\" height=\"521\"><\/a><\/p>\n<p>Then iTunes, Google Play Music, Spotify and Pandora, HDTracks stores were created for hi-res digital audio and Bandcamp for independent new releases: thanks to these programs, it\u2019s no problem at all for the music lover to discover something new and inspiring. No heavy tape recorders anymore. But still, my music collection is a messy mixture of old-school records, tape mixes and digital-only releases of varying quality.<\/p>\n<p>Here come <strong>social networks<\/strong>. What is my point anyway? Any new technology is very complicated when it\u2019s born. It becomes easy and convenient over time. That is why Facebook, the old-school way of collecting music, security and technology have something in common:<\/p>\n<ul>\n<li>Going to record stores, exchanging records and writing lengthy letters to music magazines were the closest alternative to today\u2019s social networks back in the 70s. It was, you know, <em>about<\/em> <em>communication<\/em>.<\/li>\n<li>Technology contributed a lot to the music industry. Some efforts were successful (CDs, cassettes, records), some not so much (Super Audio CDs, Eight-tracks, Microsoft Zune). But technology matured, and some 100 years after <a href=\"http:\/\/en.wikipedia.org\/wiki\/Phonograph_cylinder\" target=\"_blank\" rel=\"noopener nofollow\">Edison\u2019s cylinders<\/a>, it became so convenient that you don\u2019t actually have to think about technology anymore. You just use it. Well, at least we\u2019re almost there.<\/li>\n<li>The goal of all these technologies was to achieve better sound quality and make the whole process of buying and listening to music more convenient (and make money too!). Security was not the goal, obviously, which sometimes led to the \u201cbachelor party\u201d type of incidents.<\/li>\n<\/ul>\n<blockquote class=\"twitter-pullquote\"><p>Like traditional music media, social networks were not made with security in mind.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6C6K&amp;text=Like+traditional+music+media%2C+social+networks+were+not+made+with+security+in+mind.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>But back to social networks. The \u201cinternet\u201d industry develops new technologies like Twitter and Foursquare. They are made to help people talk to each other online (about whatever topic they like, be it music, movies or politics) and do it in the most convenient fashion (and make money for developers!). Like music media, they are sometimes very complex. MySpace (remember?) was inconvenient to share photos of cute little kittens, and it died! Facebook? It\u2019s easy, but you still have to think of things like \u201cdo I want to share my home address with anyone, or my friends, or friends of friends or my close relatives or just my wife and mama?\u201d This type of technology is still young.<\/p>\n<p>Like music media, social networks, and computers in general were not made with security in mind. It was not even in the agenda when it started! But my Google account or Facebook account or iTunes account is the all-important digital representation of me! Losing one of these accounts is the modern \u201cbachelor party incident\u201d, but with more devastating consequences. Only the idea of someone touching my 10-year old e-mail database or wiping out my Last.fm stats gives me creeps.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/05102612\/reel2reel-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5470\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/07\/23102516\/reel2reel-4-1.png\" alt=\"reel2reel-4\" width=\"637\" height=\"39\"><\/a><\/p>\n<p style=\"text-align: center;\"><em>That\u2019s just e-mails, no pictures or videos<\/em><\/p>\n<p>However, it\u2019s not right to make technology companies fully responsible of your security. Yes, dad\u2019s tapes were lacking an embedded anti-theft solution. But, if someone stole your records from your home, you can\u2019t really blame the record company or the equipment maker, right? Sometimes it works the same way with online services. Let\u2019s say, there is a 10% chance of your digital identity being stolen from Facebook itself (honestly speaking, it\u2019s probably much smaller, maybe less than 1%, but you\u2019ve got the idea). 80% chance of the same information being yanked from your laptop or smartphone. The rest is the possibility of stealing your password somewhere in-between. To keep your music collection safe you install better locks, set up an alarm system. But also carefully select who you actually invite to your party. Again, in the digital domain, 99% of threats can be blocked by <a href=\"https:\/\/www.kaspersky.com\/advert\/free-trials\/multi-device-security?redef=1&amp;THRU&amp;reseller=blog_en-global\" target=\"_blank\" rel=\"noopener nofollow\">efficient security solution<\/a>, and the rest are those that require your time, attention and knowledge (hey, we write a lot about knowledge here at the blog!).<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The very idea of someone touching my 10-year old e-mails gives me creeps.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F6C6K&amp;text=The+very+idea+of+someone+touching+my+10-year+old+e-mails+gives+me+creeps.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>On a final note, here\u2019s another observation. My record collection (with some parts of it being 60 years and older) is fine. My father\u2019s reel-to-reel tapes are okay as well (what\u2019s left of them). My cassettes still sound as horrible as they did in the early nineties. The only thing that is gone is my e-mails, photos, stories and other documents from the late 90s and early 2000s. No, they were not destroyed by a virus. I lost them myself, because I learned the word \u201cbackup\u201d only after I got familiar with \u201cMP3\u201d. And that is a good topic for the next blog post.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Any new technology can be rough around the edges. The consequences can be complex and there&#8217;s high chance for human error, especially when it comes to security.<\/p>\n","protected":false},"author":53,"featured_media":3671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[20,97,321],"class_list":{"0":"post-3670","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-facebook","9":"tag-security-2","10":"tag-technology"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/reel-to-fb\/3670\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/reel-to-fb\/3772\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/reel-to-fb\/4156\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/reel-to-fb\/4407\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/reel-to-fb\/4672\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/reel-to-fb\/5465\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/reel-to-fb\/4276\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/reel-to-fb\/4672\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/reel-to-fb\/5465\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/reel-to-fb\/5465\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/facebook\/","name":"Facebook"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=3670"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3670\/revisions"}],"predecessor-version":[{"id":15861,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/3670\/revisions\/15861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/3671"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=3670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=3670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=3670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}