Did You Trade Your Data for a DVD Rental?

In June of this year, publisher Chicken Soup for the Soul Entertainment, best known for its book series of the same name, filed for Chapter 7 and Chapter 11 bankruptcy and had many of its assets liquidated. One of these assets was the movie rental service Redbox and its eponymous scarlet rental kiosks, rendering the service defunct.

However, many kiosks remain standing outside businesses even now, which makes us wonder… what about all the data they collected while they were in use?

Yes, the Self-Serve Movie Rental Kiosks Could Potentially Put Your Data at Risk

You’re likely familiar with Redbox, with at least knowledge of them if not first-hand experience. These kiosks were once commonly found at gas stations, grocery stores, pharmacies, and other public places, and allowed customers to rent DVDs and Blu-ray discs. All one had to do was provide a credit card to sign out a movie, and the service would charge them per day until it was deposited back into one of these kiosks.

While Redbox would attempt to follow other content services into streaming as the new delivery method became widespread, these developments ultimately left the business in the past.

However, many red kiosks remain “in the wild” even now, burdening some businesses that hosted the service with clunky machines that serve no purpose. Some hobbyists have taken on the kiosks, entertaining themselves by tinkering with them. One such hobbyist enabled the Doom video game to play on one of them.

This is all in good fun… but what if we swap out the hobbyist for a hacker?

These Kiosks Still Hold a Substantial Amount of Data

Foone Turing, a programmer, used a hard drive image (which is effectively a compressed copy of a hard drive) to look into a kiosk’s inner workings.

What she found was not good.

Turing pulled a ton of data—including a lot of personally identifiable information—from the image. This data included:

  • All email addresses and zip codes that had ever rented a disc
  • All discs each email address had rented and when they had done so
  • Partially hidden credit card numbers (Turing gave the example 1234 56## #### 7890)

So, if you think about your nearest Redbox—perhaps one you used yourself—and how easy it would be to obtain that kiosk from a business that just wants to get rid of it, it should make you worry a little.

What Can We Take Away from This?

First, we all need to be more aware of what data we share and with whom. The unfortunate truth is that we have no guarantee of how secure a company is keeping its data or where it is stored. Redbox had this data sitting in minimally protected hard drives, just hanging out in public places. There’s no guarantee that any other business is being more diligent. We must strictly evaluate what we share with businesses and whether doing so is necessary.

Second, there is a cybersecurity threshold that businesses need to meet to maintain the trust of their clientele and protect themselves and their operations from impending threats.

At White Mountain IT Services, we help New Hampshire businesses accomplish both, ensuring that they maintain proper data handling and are sufficiently secured against threats. Call (603) 889-0800 to learn more about how we can help you.

Related Posts

Modern Technology is Key to Contemporary Business Competition

Technology is a big deal for any business, but for small businesses, keeping pace isn't just a good idea; it's becoming essential to the survival and success of the whole endeavor. Every instant gratification and falling behind can have a real effect on an organization’s ability to support their offerings. Why Can't We Just Stick with What Works? It’s a fair question. If your systems aren't br...

What Does Your Cybersecurity Training Need to Include?

As we stand on the threshold of a new year, it’s worth noting that the term "cybersecurity" didn't even enter the common lexicon until the late 1980s. Before that, we just called it "computer security"—mostly involving locking the server room door and hoping nobody guessed the password was "admin." Fast forward to today, and the game has changed entirely. "Hoping for the best" is no longer a viab...

Changing Course on Cybersecurity Can Save Your Business

The threat landscape is littered with organizations that have failed to adjust their security strategy to the most prevalent and modern threats. If you want to ensure you have the best chance at keeping your network and data secure, you need to build a strategy that actively addresses the threats that are actively trying to undermine your business’ security efforts. In today’s blog, we’ll discuss ...

The Smoke, Mirrors, and Mind Games Behind Cyberscams

Cyberscams can be incredibly well-crafted and dangerous, and a significant portion of this danger stems from the scammer's ability to effectively utilize the psychological triggers that we all possess to some degree. Modern security training tends to focus on what signs we all need to keep an eye out for—and for good reason—but it does little to explore why modern scams are as effective as they ar...