"This is a friendly message to advise that you remove all web based content about Puffchat"
"Please remove within 1 hour."
"Puffchat will be fixed in due course. Every piece of content with the original author's name attached to it after GMT scheduled will only provide evidence that can be used against him."
Edit: Actually, this could just be a publicity stunt. Do something boneheaded like this, get some exposure. Take flak from users that don't necessarily matter, and hope to score a lot more users. If you're not getting the growth you hoped for, what do you have to lose?Hahaha, that is a pretty hilarious bit of fail, there. I don't think it could really be intentional... it might make him kinda famous (in a probably unwanted way) but it won't net him new users.
https://www.google.com/search?tbs=sbi:AMhZZitfuTwYMbUV9Yv-cR...
Her actual account: https://twitter.com/rachelburr1
https://www.google.com/search?tbs=sbi:AMhZZivEFJQlM8ezy2mFjo...
And her account: https://twitter.com/ashleeholmes
Either they really like puffchat and they made separate account to promote it, or the pictures were stolen and the accounts are fake.
In any case, nice write up. I enjoyed reading it.
Blog’s going offline while we bump the specs so we can deal with all the traffic, bear with.
I expect to see some articles tomorrow.
First one: http://www.tuaw.com/2014/03/03/snapchat-competitor-puffchat-...
Even if this app was "secure", it wouldn't prevent the need to ditch a phone. LE can subpoena the company, find out which IP:port connected for whatever user/message. Then go to cell company and get records and track the cell.
There is no platform or space, in someone else's control, that you can or should trust this way.
> provide evidence that can be used against him.
So is the founder trying to mount a legal case against him for hacking?
How do people release public API's without THE MOST BASIC OF SECURITY CHECKS. Really? You can add a friend without any checks and even send messages as someone else? Christ.
A) Who funds these guys?
B) How can I get a piece of that seemingly-easy-as-hell-to-get pie?
I'm not a roving security consultant, so my sample size is limited, but I have seen little evidence that even basic security awareness is part of the toolkit any substantial number of developers have.
> I'm not a roving security consultant, so my sample size is limited, but I have seen little evidence that even basic security awareness is part of the toolkit any substantial number of developers have.
My experience matches yours.
It's actually a pretty damn good line, and I think it's really, fantastically hard to know when your ethical responsibility as an engineer starts to outweigh your obligations as an employee.
Proper course is to disclose to company first, then disclose after fix is in place in reasonable amount of time. Why risk everyone for your benefit?
In the interest of responsible disclosure I did try and contact the dev multiple ways, I was either ignored or not replied to and I feel users deserve to know what’s happening with their data.
He also says that he tried to contact the developer but got no response.
The dev would have been much better off apologizing, pushing a fix, and asking for a temporary embargo while the fix is put into place.
"In the interest of responsible disclosure I did try and contact the dev multiple ways, I was either ignored or not replied to and I feel users deserve to know what’s happening with their data."
That aside, though, when the issues are this egregious I'm honestly not sure what the right approach is. With flaws this bad it's hard to imagine that they're even capable of fixing the problems, let alone responding appropriately to the disclosure.
"In the interest of responsible disclosure I did try and contact the dev multiple ways, I was either ignored or not replied to and I feel users deserve to know what’s happening with their data."
Except, you know, not sketchy.