While I've heard the term 'compromised' a little more often than what's comfortable recently, I've been thinking on what that means. From little bits of not-always-facts floating around, a person with a dev system was able to log into the restricted access portion of Sony's network. 'Compromised' doesn't necessarily mean data was copied, but I suppose we'll get better info on that later once Sony is comfortable enough to trust us with information on our... information.
The thing I'm trying to get my head around is how the personal info was stored. I mean, first thing that comes to my mind when I think of non encrypted user data is a gigantic 77 million user info .txt file... fine, that would be impractical and moronic, but if the hacker got a copy of all 77 million users info, how much space do you think that takes up?
On a side note, Sony shut down once it was sure it had someone unwanted in the network so maybe a couple people have semi-secure data.
The thing I'm trying to get my head around is how the personal info was stored. I mean, first thing that comes to my mind when I think of non encrypted user data is a gigantic 77 million user info .txt file... fine, that would be impractical and moronic, but if the hacker got a copy of all 77 million users info, how much space do you think that takes up?
On a side note, Sony shut down once it was sure it had someone unwanted in the network so maybe a couple people have semi-secure data.