Personal Democracy Plus Our premium content network. LEARN MORE You are not logged in. LOG IN NOW >

A Chink in Convio’s Armor?

BY Kate Kaye | Sunday, March 27 2005

An Information security firm, M2000/IS, investigated four Web-hosting providers serving nonprofits, and found that Convio’s systems allowed for potential personal data security breaches. A report by the company’s chief scientist, David Tubbs is featured in PoliticsOnline’s NetPulse newsletter published March 16.

In an effort to suss out sites that “may have a large potential for use by malicious predators” M2000/IS (all I can think of is Mystery Science Theater 3000) decided sites that attract children and handle financial transactions online would be the most appropriate to analyze, so their first target was nonprofit sites, which are typically hosted by an outside firm. Of hosting providers specifically serving nonprofits, M2 chose Convio, eTapestry, GetActive, and Kintera as “the most interesting…based on size, web prevalence, and the profile of the client base.” Some of these firms also service political campaigns and politically-relevant issue advocacy groups.

In its investigation, the firm asked, "Are there inherent, obvious risks in how these web sites are designed and/or used?" All were deemed non-threatening except for Convio-hosted sites, which apparently “used previously placed cookies to automatically fill in the users' information in forms of all types. This information was often even shared with related sites and their forms.” The thing is, the forms were pre-filled without requiring user authentication, such as a pre-determined login and password.

M2 considers this a security risk because “if access is obtained from a publicly available Internet location (in say, a school, a library, an Internet Café, an airport, or a kiosk), and the cookie is instantiated, the next visitor to that web site, using that computer, will see all of the previous user's information.”

The report also goes on to state, “it is only reasonable to infer that if operational vulnerabilities such as these exist at the first phase investigation level, then a deeper investigation might well uncover vulnerabilities that are more significant.”

Yikes. Look out Convio.

This report was published over a week ago, and I haven’t heard any rumblings about it. Actually, I’m a bit surprised that the other companies mentioned in the report haven’t used it to their advantage by tooting their own privacy protecting horns. None seem to have done so, though. My guess is they’re either taking the report with a grain of salt, conducting their own internal assessments, or most likely, running around like chickens with their heads cut off in preparation for the big Association of Fundraising Professionals conference in Baltimore next week.

News Briefs

RSS Feed today >

First POST: Sad Reality

How social media changed the course of the Ferguson story; Ready for Hillary's 3-million-member email list; why Mark Cuban opposes net neutrality rules; and much, much more. GO

monday >

First POST: All Against All

Why Uber isn't "the future" of cities; why journalists lost control of journalism; how Sean Parker is spending his political money; and much, much more. GO

friday >

First POST: Power Frames

The differences between "old power" and "new power"; Uber as a new/old power hybrid; debating Clay Shirky's feminist cred; and much, much more. GO

thursday >

First POST: Creeping

Senator Al Franken's tough questions for Uber's CEO; how the NSA could make its phone metadata program permanent; global privacy groups launch a personal spyware catcher called Detekt; and much, much more. GO

Recreation.gov and other Govt Projects Move Toward Embracing New Digital Approach

A draft request for proposals for the revamping of Recreation.gov will include a requirement that reservation availability data be publicly accessible and that all proposals detail how they will enable third-party sales, as two members of the United States Digital Services have joined the government team overseeing the RFP, meeting some key demands of civic technologists and consumer oriented technology companies. GO

wednesday >

First POST: Ubermenschens

Surge-pricing in effect for Uber privacy violations; why "privacy" policies should be called "data usage" policies; pols silent on Uber mess; and much, much more. GO

More