Did You Trade Your Data for a DVD Rental?

In June of this year, publisher Chicken Soup for the Soul Entertainment, best known for its book series of the same name, filed for Chapter 7 and Chapter 11 bankruptcy and had many of its assets liquidated. One of these assets was the movie rental service Redbox and its eponymous scarlet rental kiosks, rendering the service defunct.

However, many kiosks remain standing outside businesses even now, which makes us wonder… what about all the data they collected while they were in use?

Yes, the Self-Serve Movie Rental Kiosks Could Potentially Put Your Data at Risk

You’re likely familiar with Redbox, with at least knowledge of them if not first-hand experience. These kiosks were once commonly found at gas stations, grocery stores, pharmacies, and other public places, and allowed customers to rent DVDs and Blu-ray discs. All one had to do was provide a credit card to sign out a movie, and the service would charge them per day until it was deposited back into one of these kiosks.

While Redbox would attempt to follow other content services into streaming as the new delivery method became widespread, these developments ultimately left the business in the past.

However, many red kiosks remain “in the wild” even now, burdening some businesses that hosted the service with clunky machines that serve no purpose. Some hobbyists have taken on the kiosks, entertaining themselves by tinkering with them. One such hobbyist enabled the Doom video game to play on one of them.

This is all in good fun… but what if we swap out the hobbyist for a hacker?

These Kiosks Still Hold a Substantial Amount of Data

Foone Turing, a programmer, used a hard drive image (which is effectively a compressed copy of a hard drive) to look into a kiosk’s inner workings.

What she found was not good.

Turing pulled a ton of data—including a lot of personally identifiable information—from the image. This data included:

  • All email addresses and zip codes that had ever rented a disc
  • All discs each email address had rented and when they had done so
  • Partially hidden credit card numbers (Turing gave the example 1234 56## #### 7890)

So, if you think about your nearest Redbox—perhaps one you used yourself—and how easy it would be to obtain that kiosk from a business that just wants to get rid of it, it should make you worry a little.

What Can We Take Away from This?

First, we all need to be more aware of what data we share and with whom. The unfortunate truth is that we have no guarantee of how secure a company is keeping its data or where it is stored. Redbox had this data sitting in minimally protected hard drives, just hanging out in public places. There’s no guarantee that any other business is being more diligent. We must strictly evaluate what we share with businesses and whether doing so is necessary.

Second, there is a cybersecurity threshold that businesses need to meet to maintain the trust of their clientele and protect themselves and their operations from impending threats.

At White Mountain IT Services, we help New Hampshire businesses accomplish both, ensuring that they maintain proper data handling and are sufficiently secured against threats. Call (603) 889-0800 to learn more about how we can help you.

Related Posts

What to Prioritize for a Secure Password Strategy

Securing your accounts against unauthorized access begins with the implementation of a strong password. It's crucial to recognize that not all passwords offer the same level of protection. Here are five essential guidelines to ensure the security of your accounts. Emphasize Complexity The strength of a robust password hinges on its complexity. Avoid easily predictable combinations like "123456" or...

4 Ways a Managed Service Provider Can Help Your Business

How much does your business rely on technology to keep your organization running forward? As business technology becomes more complex, it’s becoming increasingly popular for organizations to have their own internal IT departments to manage and maintain it. Yet, small businesses don’t often have the necessary funds for such a feat. How can your company afford quality IT service? You can start by pu...

Learn How to Identify and Avoid Phishing Messages

You open your email and you have a message claiming your bank account has been compromised. You click the link, log in, and, whoops, you just handed your credentials to a cybercriminal. You’ve been a victim of phishing, where scammers bait you with fake messages and reel you in like an unsuspecting fish. You don’t have to be their next catch. Here’s how to recognize and fight back against phishing...

You May Not Think You’re Popular, but Your Data Certainly Is

Data is extremely important in the way that most businesses conduct themselves. This results in other people wanting that information, too. Today’s blog will look at how seemingly everyone online is out for your data.  Businesses Want Your Data… Companies and hackers are both intensely interested in acquiring your personal data, albeit for vastly different reasons.  Companies collec...