{"id":1032,"date":"2008-11-30T11:31:07","date_gmt":"2008-11-30T19:31:07","guid":{"rendered":"\/?p=1032"},"modified":"2008-11-30T11:42:46","modified_gmt":"2008-11-30T19:42:46","slug":"my-dog-ate-my-homework","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=1032","title":{"rendered":"My dog ate my homework"},"content":{"rendered":"<p>Am I the only one, or is this a\u00a0<em>strange<\/em> email from Facebook?<\/p>\n<p><img loading=\"lazy\" src=\"\/wp-content\/images\/2008\/12\/facebook-lost.jpg\" alt=\"\" width=\"480\" height=\"404\" \/><\/p>\n<p>I mean, &#8220;lost&#8221;??\u00a0 No backups?\u00a0\u00a0<\/p>\n<p>I\u00a0hear you.\u00a0 This must be fake &#8211; a phishing email, right?\u00a0\u00a0\u00a0<\/p>\n<p><img loading=\"lazy\" src=\"\/wp-content\/images\/2008\/12\/facebook-lost-1.jpg\" alt=\"\" width=\"403\" height=\"359\" \/><\/p>\n<p>No https\u00a0on the\u00a0page I&#39;m directed to, either&#8230;\u00a0The average user doesn&#39;t have a chance when figuring out whether this is legit or not.\u00a0 So guess what.\u00a0 He or she won&#39;t even try.<\/p>\n<p>I&#39;ll forget and forgive the &#8220;loss&#8221;, but following it up by putting all their users through\u00a0a\u00a0sequence of steps\u00a0that teaches\u00a0them how to be phished really stinks.<\/p>\n<p>Seems to drive home the main premise of Information Cards set forth in the <a href=\"https:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf\">Laws of Identity<\/a>:<\/p>\n<p style=\"padding-left: 30px;\">Hundreds of millions of people have been trained to accept anything any site wants to throw at them as being the \u201cnormal way\u201d to conduct business online. They have been taught to type their names,<br \/>\nsecret passwords and personal identifying information into almost any input form that appears on their screen.<\/p>\n<p style=\"padding-left: 30px;\">There is no consistent and comprehensible framework allowing them to evaluate the authenticity of the sites they visit, and they don\u2019t have a reliable way of knowing when they are disclosing private information to illegitimate parties.<\/p>\n<p>\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Unfortunately, the settings&#8230; were&#8230; lost&#8230;<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[21,68,3],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1032"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1032"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/1032\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1032"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1032"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1032"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}