< Return to Video

Single Point of Failure: The Day Google Forgot To Check Passwords

  • 0:00 - 0:06
    In the aftermath, when everything had been
    started to recover and people had more or
  • 0:06 - 0:11
    less tidied up and the stock markets had started
    to recover from the trillions of dollars wiped
  • 0:11 - 0:13
    off them,
  • 0:13 - 0:18
    Google's network engineers said that were
    only five people in the world who are able
  • 0:18 - 0:22
    to approve changes to their most critical
    code.
  • 0:22 - 0:25
    And each one of those five was entirely trusted.
  • 0:25 - 0:32
    July 4th. In Western Europe, it is Friday
    afternoon, and office workers are looking
  • 0:33 - 0:37
    at their clocks and trying to work out if
    it's okay to leave work early.
  • 0:37 - 0:43
    In America, they are gearing up for a three-day
    Independence Day weekend.
  • 0:43 - 0:49
    Over at Google's headquarters in Mountain
    View, most of the building is deserted; on-call
  • 0:49 - 0:53
    engineers are either at home, their phones
    ready to buzz if anything goes wrong, or they're
  • 0:53 - 0:58
    pulling late-night shifts in datacentres located
    around the world.
  • 0:58 - 1:01
    There is one well-lit office, though, hidden
    away in a quiet corner of the building. In
  • 1:01 - 1:08
    it is Maria Christensen, one of Google's most
    senior engineers and one of the Trusted Five.
  • 1:08 - 1:14
    She is, against all corporate procedure, rolling
    out a change to Google's core infrastructure
  • 1:14 - 1:16
    code.
  • 1:16 - 1:22
    She's changed only one section: and it's the
    very first part of the login code for Google
  • 1:22 - 1:26
    Apps. This should be an incredibly complicated
    function that spins off more functions to
  • 1:26 - 1:32
    deal with checking passwords, two-factor authentication,
    third-party password checks, suspicious activity,
  • 1:32 - 1:38
    hackers, phreakers, fraudsters, and all manner
    of disaster prevention.
  • 1:38 - 1:45
    She's changed just one line of code, she's
    put it at the top, and it says...
  • 1:45 - 1:47
    Return true.
  • 1:47 - 1:52
    She bypasses all the red flags from the software
    that say this won't work, this is dangerous,
  • 1:52 - 1:58
    this is broken, and instead she marks it for
    immediate rollout and commits it.
  • 1:58 - 2:03
    So Google's systems promptly roll it out across
    their datacentres. From coast to coast in
  • 2:03 - 2:08
    North America; over to Dublin and over to
    Europe; to the Far East and down to South
  • 2:08 - 2:12
    America. It takes about three minutes. And
    what it means is this:
  • 2:12 - 2:19
    No matter what you enter as a Google password,
    it will be treated as correct. There are no
  • 2:20 - 2:26
    password checks any more. If you type in the
    username, you will get in.
  • 2:26 - 2:30
    And if this seems implausible, if this seems
    like something that wouldn't happen, remember
  • 2:30 - 2:36
    Dropbox, the file hosting service used by
    175 million people including, I'm fairly sure,
  • 2:36 - 2:38
    pretty much everyone in this room.
  • 2:38 - 2:45
    In 2011, they had exactly that security bug
    for three hours. Now fortunately, the person
  • 2:45 - 2:49
    who discovered it -- who wasn't a Dropbox
    employee -- disclosed it responsibly to them
  • 2:49 - 2:52
    instead of telling the world, so the damage
    was limited.
  • 2:52 - 2:58
    Maria has no intention of responsibly disclosing
    anything. Most of the engineers that would
  • 2:58 - 3:03
    get notified of a code change like that aren't
    on call. And those that are have somewhere
  • 3:03 - 3:08
    between about one and three minutes before
    Maria gets around to logging into their now
  • 3:08 - 3:12
    open Google accounts -- never mind the email
    notification, they've got about three minutes
  • 3:12 - 3:17
    to, read it, understand it, and grasp exactly
    what the change means before Maria logs in
  • 3:17 - 3:21
    and remotely wipes their Android phone by
    reporting it as stolen.
  • 3:21 - 3:26
    None of the engineers work it out in time.
    The rest of Google's Trusted Five are still
  • 3:26 - 3:30
    asleep as their phones quietly erase themselves.
  • 3:30 - 3:36
    So then Maria emails her manifesto to dozens
    of news sites, posts messages on a few high-traffic
  • 3:36 - 3:40
    tech forums, then logs out -- which is ironic,
    given that logging out doesn't actually mean
  • 3:40 - 3:43
    anything any more -- gets into her car, and
    goes to catch a flight.
  • 3:43 - 3:50
    As soon as the first journalist tests it successfully,
    the news goes ballistic. The first place to
  • 3:51 - 3:57
    break it of all the web, was oddly the Drudge
    Report: and they said later that it was because
  • 3:57 - 4:02
    they didn't use Gmail themselves, and didn't
    really get it, and just went with the story
  • 4:02 - 4:04
    rather than immediately going to protect themselves.
  • 4:04 - 4:08
    'Cos that's what most people did. In the hours
    that followed, people tended to fall into
  • 4:08 - 4:09
    one of three groups:
  • 4:09 - 4:14
    First of all, the defenders. Desperately trying
    to lock down their accounts, desperately trying
  • 4:14 - 4:19
    to delete anything that might be incriminating,
    and to stop all their other accounts getting
  • 4:19 - 4:19
    compromised.
  • 4:19 - 4:26
    Because, remember, if you have access to someone's
    email address, then you have access to every
  • 4:26 - 4:31
    web service they use -- because they can request
    a password reset sent straight to your inbox.
  • 4:31 - 4:36
    How good you were at being a defender generally
    depended on how good you were at getting all
  • 4:36 - 4:41
    your other accounts moved away from that compromised
    address.
  • 4:41 - 4:45
    Of course, even the folks who were initially
    smug that they didn't use Gmail realised that
  • 4:45 - 4:50
    other people they emailed did.
  • 4:50 - 4:55
    Facebook was the first big web service to
    react, quickly enough that most commentators
  • 4:55 - 5:01
    suggested they actually had a plan in place
    for this years before. Within a few minutes
  • 5:01 - 5:06
    of the story breaking, Facebook turned off
    not just password resets but the ability to
  • 5:06 - 5:11
    log in at all, on the assumption that most
    people would have their accounts compromised,
  • 5:11 - 5:16
    so they just turned it off. And since nearly
    everyone was already logged in on their phone
  • 5:16 - 5:22
    and their computer, Facebook rapidly became
    *the* trusted method to contacting anyone
  • 5:22 - 5:27
    -- and that was a new level of trust that
    stuck around afterwards as folks looked warily
  • 5:27 - 5:28
    at email.
  • 5:28 - 5:33
    Then there were the amateur detectives. Those
    that suspected that their partner was cheating
  • 5:33 - 5:36
    on them. Those that were desperate to find
    out what their colleagues were earning, or
  • 5:36 - 5:39
    what their boss really thought of them. It
    wasn't restricted to email, of course; because
  • 5:39 - 5:45
    if you have access to someone's Google account,
    in most cases you have access to their full
  • 5:45 - 5:51
    search history and all the web sites they've
    clicked on. For years, and years, and years.
  • 5:51 - 5:57
    Have you turned it off? Most people in this
    room haven't. It was described by one writer
  • 5:57 - 6:01
    as "like looking into my wife's soul". And
    the divorce rate had a notable uptick a few
  • 6:01 - 6:02
    months later.
  • 6:02 - 6:07
    Meanwhile, companies using Gmail, or companies
    working with companies that used Gmail, just
  • 6:07 - 6:13
    had to assume that all their trade secrets
    had been stolen: in the years to come, patent
  • 6:13 - 6:17
    and trademark lawyers would make an enormous
    amount of money as allegations flew back and
  • 6:17 - 6:20
    forth between corporations.
  • 6:20 - 6:25
    Now the European stock markets, the only ones
    open on July 4th at that time, went into freefall
  • 6:25 - 6:29
    almost immediately; the Asian and American
    ones would do the same when they opened the
  • 6:29 - 6:30
    next Monday.
  • 6:30 - 6:36
    But the most obvious group, if not the largest,
    were the burners. Everyone who had any sort
  • 6:36 - 6:44
    of prominent online presence got their account
    destroyed, utterly destroyed, within ten minutes.
  • 6:44 - 6:48
    Any YouTube channel with any sort of audience
    found all its work deleted and vandalised,
  • 6:48 - 6:54
    even worse than the new comment system that
    YouTube had brought in. Some burners attacked
  • 6:54 - 6:59
    individual people thoroughly, hoping to wipe
    everything as part of a vendetta; but others...
  • 6:59 - 7:03
    others just tried to destroy as much data
    as they could from as many people as they
  • 7:03 - 7:04
    could as quickly as possible.
  • 7:04 - 7:11
    Google, of course, had backups. They did roll
    everything back -- but a lot of third-party
  • 7:11 - 7:17
    sites, vulnerable through password resets,
    weren't anywhere near so lucky.
  • 7:17 - 7:18
    (LAUGHTER)
  • 7:18 - 7:24
    Every blog with more than a few readers got
    crude messages added to it, or code that redirected
  • 7:24 - 7:31
    to shock sites, or just torn apart and destroyed.
    A huge number had no usable backups. This
  • 7:31 - 7:36
    was the final death knell for most third-party
    web message boards, the old ones which had
  • 7:36 - 7:42
    been falling out of use for years and years.
    As soon as one administrator account fell,
  • 7:42 - 7:46
    the whole site was quickly destroyed. And
    not many of those ever recovered because not
  • 7:46 - 7:48
    many of them had backups.
  • 7:48 - 7:53
    Some things did work in favour of the "good
    guys". First of all, the enormous rush of
  • 7:53 - 7:58
    traffic -- of people trying to fix and break
    things meant that even Google couldn't quite
  • 7:58 - 8:03
    cope with the load: a lot of folks were frustrated
    by slow loading times and falling servers.
  • 8:03 - 8:08
    But thirty minutes in, at least some of Google's
    network engineers had worked out what was
  • 8:08 - 8:13
    going on and pulled the plug -- in one case
    physically, literally pulling plug from data
  • 8:13 - 8:19
    centres and uncontrollably shutting down everything
    they could. Someone finally managed to get
  • 8:19 - 8:24
    an actual shutdown command into the systems
    that Maria had compromised about two hours
  • 8:24 - 8:29
    afterwards, and three minutes later, Google
    fell off the internet for the first time in
  • 8:29 - 8:33
    a very, very long while.
  • 8:33 - 8:38
    In amongst this two hours of mess, this pandemonium,
    were the people that Maria Christensen was
  • 8:38 - 8:43
    actually trying to reach. She was hoping to
    be the next Chelsea Manning, the next Julian
  • 8:43 - 8:47
    Assange, the next Edward Snowden. More than
    that: she was hoping to create a hundred,
  • 8:47 - 8:53
    a thousand, a million people taking that whistleblower
    role, using the brief hours of "freedom" she'd
  • 8:53 - 8:57
    created to change the world for the better.
    That was her manifesto:
  • 8:57 - 9:02
    Go out. Find the things that need to be leaked,
    go through the files of the corporations and
  • 9:02 - 9:07
    governments that are destroying our world,
    and show them the light of day.
  • 9:07 - 9:12
    Her view was woefully optimistic. And yes,
    some people did. There were thousands of leaks,
  • 9:12 - 9:18
    some of international importance: a few people
    remembered the Obama transition team, after
  • 9:18 - 9:24
    the 2008 election, used Gmail until they could
    get their official whitehouse.gov email addresses
  • 9:24 - 9:31
    set up. And there were stories of billionaire
    fashion CEOs putting stories about sweatshops
  • 9:32 - 9:37
    and burying them; stories of mining companies
    exploiting workers and exposing them to incredible
  • 9:37 - 9:42
    danger; tale after tale after tale of people
    putting aside human concerns and -- this phrase
  • 9:42 - 9:46
    got used a lot -- acting in the best interests
    of shareholders.
  • 9:46 - 9:49
    But none of those stories made the news.
  • 9:49 - 9:54
    Because what Maria Christensen hadn't done
    was manage the story. Wikileaks and its allies
  • 9:54 - 10:00
    always had: they'd drip-fed the stories over
    months into a 24-hour news cycle that always
  • 10:00 - 10:03
    wanted more, more, more, but instead...
  • 10:03 - 10:07
    In this case, though, the story was about
    the process, not about the information. The
  • 10:07 - 10:11
    angle that all the news took was that email
    was suddenly insecure, that you were at risk,
  • 10:11 - 10:14
    that you should defend against it and this
    is how you do it, that web sites are being
  • 10:14 - 10:20
    damaged, and that this is how you protect
    yourself, and watch us because we will help
  • 10:20 - 10:20
    you.
  • 10:20 - 10:24
    So there were no stunning revelations plastered
    on the front pages. There should have been,
  • 10:24 - 10:30
    given an infinite number of front pages, but
    there were, simply, too many stories, and
  • 10:30 - 10:34
    all of them were much less interesting to
    the public than the question of whether your
  • 10:34 - 10:38
    partner has seen your browser history.
  • 10:38 - 10:45
    And of course, for most people, there was
    no long-term damage, at least not to them
  • 10:45 - 10:49
    personally. Statistically speaking, you'd
    get away with it. And sure, everyone knew
  • 10:49 - 10:54
    someone who'd been affected, everyone knew
    someone who'd got in trouble, but chances
  • 10:54 - 10:59
    are that you, yourself, had gotten away with
    it. And while a lot of high-profile companies
  • 10:59 - 11:05
    suffered slightly, there were no world-changing
    moments. If dumping untold gallons of oil
  • 11:05 - 11:11
    into the Gulf couldn't kill BP: what could?
    So most small businesses survived unscathed
  • 11:11 - 11:17
    and the economy recovered, slowly, having
    been damaged no more than by any natural disaster.
  • 11:17 - 11:24
    And Gmail, a year later, had just as many
    active users as before. Because, after all,
  • 11:24 - 11:28
    what were the odds of that ever happening
    again? And it's not like the government couldn't
  • 11:28 - 11:33
    read all your messages anyway. And no-one
    really got hurt in the long run, and maybe
  • 11:33 - 11:38
    it was for the best that me and her broke
    up, y'know? It all works out in the end. And
  • 11:38 - 11:41
    besides, it would be a real pain to try to
    switch my email account somewhere else. I'd
  • 11:41 - 11:47
    have to change my email address!
  • 11:47 - 11:52
    It's amazing how much we trust to single points
    of failure. And while this is a worst-case
  • 11:52 - 11:58
    scenario -- very much so -- everyone here
    will have that one lynchpin on which everything,
  • 11:58 - 12:04
    at least in your online life, hangs. That
    backup you haven't taken for a while. The
  • 12:04 - 12:09
    email account that you forgot had access to
    everything. Or that password that your ex
  • 12:09 - 12:10
    still knows.
  • 12:10 - 12:16
    But my point is this: even in the face of
    seeming disaster, when the world is falling
  • 12:16 - 12:23
    around you, you remember that eventually,
    this too shall pass. Because it takes more
  • 12:27 - 12:30
    than just one single point of failure to change
    the world.
  • 12:30 - 12:36
    Oh, and as for Maria Christensen? She got
    arrested at the airport, after her flight
  • 12:36 - 12:39
    was delayed... because the airline ran on
    Google Apps.
  • 12:39 - 12:43
    Thank you very much, I've been Tom Scott,
    enjoy the rest of the show.
Title:
Single Point of Failure: The Day Google Forgot To Check Passwords
Description:

more » « less
Duration:
13:05

English, British subtitles

Revisions