legal: Handling of user incompetence #15
Labels
No Label
FCKPTN
WIP
bug
docs done
docs needed
duplicate
enhancement
feature
gemini
invalid
legal-ish
needs help
onionz
proposal
question
resolved
security
spam
todo
upstream-related
wontfix
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: dotya.ml/community#15
Loadingβ¦
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
DISCLAIMER: I ain't your lawyer and this is not a legal advise.
Currently it seems that dotya doesn't handle the scenario where end-users set weak password and then complain that someone was able to guess it which could be legally problematic.
See https://docs.github.com/en/free-pro-team@latest/github/site-policy/github-terms-of-service point 4 for reference
Suggesting to adapt simmilar policy to avoid possible lawsuit.
thanks for the input.
how could anyone be liable for your crap password though?
anyway, currently users are forced to deliver a passwd of at least 12 characters and it has to contain uppercase, lowercase, digits and special signs - which, I believe, on its own makes this a-not-ridiculously-trivial password
https://www.keepersecurity.com/blog/2015/02/23/linkedin-settles-lawsuit-for-1-25-million-over-weak-passwords/
https://bits.blogs.nytimes.com/2015/02/23/linkedin-settles-class-action-suit-over-weak-password-security/
I have no issues setting the requirement to be a at-least-80-character password.. π₯
I think we need the CoC more, though @kreyren
What if there is a software that can easily brute-force these accounts?
e.g.
you'd be rate-limited on our side π π
Not everyone prefers strong password i would suggest handling this legally stating that end-users are responsible to choose a strong password
it would at least force people to either turn around or start using
pass
Afaik Majority of the people are using weak passwords so that woudn't be good for the service if it's not user-friendly enough
wdym
you can tell Gitea to force people to use passwords of certain complexity..
either you take it or not. that is more reasonable than putting the blame on them because a) is teaching them something about security b) is making them responsible for their own crap c) makes their account harder to compromise.
we can also force 2fa if you want
That's not what the law says afaik see the provided example
So we should be considering password failure to be the service responsibility unless state otherwise in the ToS. which would be
I would like to see some symbol for 2FA enabled accounts if the end-user desires that and for the organization management to see which users set up 2FA other then that i don't think we can do anything in the general interest here
first of all, that's probably US law.
and should we be liable I don't see why not to set our passwd complexity reguirements to a proper level (over 9000) to avoid this completely.
symbol next to 2fa-enabled accounts is an upstream request and if we force it I don't think we need to show who's got it enabled anyway
I belive that in EU GDPR is relevant as giving unauthorized access would probably count as privacy violation which in czechia would be probably 110/2019 Sb. Β§5 (b) https://www.zakonyprolidi.cz/cs/2019-110
Relevant: https://www.politico.eu/article/german-lawsuit-accuses-amazon-of-breaking-eu-privacy-law/
Relevant: http://ec.europa.eu/information_society/newsroom/cf/document.cfm?doc_id=835
I believe that someone can make the claim that they were damaged by an online service's unauthorized access which wouldbe probaby weak at the court, but seems to hold for some cases.. So i would probably apply said clause in ToS just to be safe.
Referencing https://www.google.com/search?client=firefox-b-e&q=gentoo+hack which was caused by the lack of 2FA on compromised account.. After which github provides a symbol in organizations to show that they are using 2FA which i would recommend here too, but probably upstream bug if not set already.
you can be using 2fa and not tell anybody and telling everybody still doesn't make it more secure, that's imo just gh's marketing.
so what would probably work for us - forced 2fa and forced strong password.
and we can make it clear in the registration page, too.
problem solved. :D
@wanderer That won't cover you in case there is a major bug in gitea that allows unauthorized access.
well how is an upstream bug our responsibility?
@wanderer You are a service provider of a software that directly states that they are not liable for the software runtime to the extend permitted by the law https://github.com/go-gitea/gitea/blob/master/LICENSE#L14
Where service providers are afaik responsible for the:
on the platform unless specified otherwise in the ToS where law allows.
pardon my ignorance, but if upstream didn't find the bug, how were we supposed to do it? :D
putting this in the tos is just BS for it's own sake as anyone sane enough knows there's noone to blame here, really.
but ok, let's declare ourselves not liable and suddenly the problem is solved - this is crazy :D
Common sense would be to use source-based distro that requires passing of tests. To catch bugs that were caused by upstream's pebcak.
Disagree for sources provided e.g. with linkedin
as we're building Gitea from sources regularly, we'd have to write some of the tests, the current tests are more of a functional regression testing.
the distro doesn't solve this for us unless the maintainer/packager for the distro writes additional tests, too, which would then likely be contributed upstream anyway
regardless, the proper way is to put the blame away?
That would be upstream bug for test tracking
Legally i was always recommeneded to handle the password scenario this way so that end-users are responsible for the password they've chosen to the reasonable degree
Also i would recommend adapting ToS for security issues to inform affected users which makes the service more trustworthy and should handle the legal liability for service-caused damages to it's users.
fwiw: i am being forced to say that i've baited @wanderer into making that repo private through the mighty power of south park to prove my point.
yeah...you're almost worse than the RIAA
but the point sure is made.