@Encoders said: it's really impressive with how spineless LET is
In what sense? Do you really think that John would bite hand which feeds him? Get a grip. LET is in business to make money, that's it. There is no real ethics, morale or inclination to "be right". Everything is to forget. As soon as CC launch 7$/year - all crap will be wiped out of memory. It always was like this, always is and always be. Low end cares only for $7.
It does not matter how good of a deal CC launches; I will never sign up for their service again. In fact, I will never go back to past providers that sucked. The providers that suck will either survive (by selling services to large enterprises) or just disappear.
Ultimately, it all comes down to good service and good will. Tech savvy customers, as opposed to average Joes, do not repeat their mistakes in the market.
In my opinion, a data breach is one of the worst things that can happen in the IT world. ( the worst period )
That said, I don’t think Virtualizor is the only one at fault here. Software today is often built in “fast-forward” mode—features rushed out, deadlines tight, and security sometimes seen as a lower priority ( or none in some cases ). They're not the first to get breached, and sadly, they won’t be the last.
If we were to stop using every provider that had a security incident, even well-known enterprise vendors would be out of the picture. The real issue lies in the overall quality and security practices of the software—not just whether they've had a breach.
What’s ironic is that when a provider does try to take security seriously—by enforcing things like KYC (Know Your Customer)—they often get bashed for it. People complain: “that nerd is doing KYC, he sucks,” even though it's part of a serious effort to improve trust and prevent abuse.
So in the end, we can’t have it both ways. We either accept stronger security—even if it's inconvenient—or we keep playing whack-a-mole with breaches and blaming whoever happens to get hit next.
Whatever worked 5 years ago will not take us further.
Host-C - VPS & Storage VPS Services – Reliable, Scalable and Fast - AS211462
A data breach is annoying, but it can happen to anyone.
What defines a company is how they respond to it. ColonCrossing have pretty much lied from the start, still haven't actually bothered notifying everyone whose personal data was lost, and the few they have talked to seem to have got the message "ahh well it's working again, what you complaining about?"
I mean I always knew they were pretty bad, and only have stuff running with them because I won some free credits but if I'd ever actually paid them a cent, I'd be fuming.
@ahnlak said:
A data breach is annoying, but it can happen to anyone.
What defines a company is how they respond to it. ColonCrossing have pretty much lied from the start, still haven't actually bothered notifying everyone whose personal data was lost, and the few they have talked to seem to have got the message "ahh well it's working again, what you complaining about?"
I mean I always knew they were pretty bad, and only have stuff running with them because I won some free credits but if I'd ever actually paid them a cent, I'd be fuming.
ColonCleansing has never told the truth since its inception
@host_c said:
In my opinion, a data breach is one of the worst things that can happen in the IT world. ( the worst period )
That said, I don’t think Virtualizor is the only one at fault here. Software today is often built in “fast-forward” mode—features rushed out, deadlines tight, and security sometimes seen as a lower priority ( or none in some cases ). They're not the first to get breached, and sadly, they won’t be the last.
If we were to stop using every provider that had a security incident, even well-known enterprise vendors would be out of the picture. The real issue lies in the overall quality and security practices of the software—not just whether they've had a breach.
I partially disagree here. It is not only "lower priority" in software development world, it is lower priority for any business. There are for sure some exclusions but they are rare. What drives the business? Profit, and in the end it is features features features (if we are talking about any IT product). You can't "sell" proper security policies to the C-level. And security is what usually has the lowest budget.
What’s ironic is that when a provider does try to take security seriously—by enforcing things like KYC (Know Your Customer)—they often get bashed for it. People complain: “that nerd is doing KYC, he sucks,” even though it's part of a serious effort to improve trust and prevent abuse.
Enforcing KYC is often done for compliance reasons (which is not a real security) and it is additional risks business must handle. Leaked emails and leaked IDs/SSNs are of very different severity.
So in the end, we can’t have it both ways. We either accept stronger security—even if it's inconvenient—or we keep playing whack-a-mole with breaches and blaming whoever happens to get hit next.
Having KYC and caring abour customer data are different topics, so I am disagreeing completely here.
Whatever worked 5 years ago will not take us further.
Check our KVM VPS plans in 🇵🇱 Warsaw, Poland and 🇸🇪 Stockholm, Sweden
is there a list somewhere of which hosts at LET are allowed to be hacked due to their own laziness, lose customer PII, lie about it, continue to lie once it's in the media, then keep their vendor account?
@grasple said:
is there a list somewhere of which hosts at LET are allowed to be hacked due to their own laziness, lose customer PII, lie about it, continue to lie once it's in the media, then keep their vendor account?
Comments
In what sense? Do you really think that John would bite hand which feeds him? Get a grip. LET is in business to make money, that's it. There is no real ethics, morale or inclination to "be right". Everything is to forget. As soon as CC launch 7$/year - all crap will be wiped out of memory. It always was like this, always is and always be. Low end cares only for $7.
It does not matter how good of a deal CC launches; I will never sign up for their service again. In fact, I will never go back to past providers that sucked. The providers that suck will either survive (by selling services to large enterprises) or just disappear.
Ultimately, it all comes down to good service and good will. Tech savvy customers, as opposed to average Joes, do not repeat their mistakes in the market.
In my opinion, a data breach is one of the worst things that can happen in the IT world. ( the worst period
)
That said, I don’t think Virtualizor is the only one at fault here. Software today is often built in “fast-forward” mode—features rushed out, deadlines tight, and security sometimes seen as a lower priority ( or none in some cases ). They're not the first to get breached, and sadly, they won’t be the last.
If we were to stop using every provider that had a security incident, even well-known enterprise vendors would be out of the picture. The real issue lies in the overall quality and security practices of the software—not just whether they've had a breach.
What’s ironic is that when a provider does try to take security seriously—by enforcing things like KYC (Know Your Customer)—they often get bashed for it. People complain: “that nerd is doing KYC, he sucks,” even though it's part of a serious effort to improve trust and prevent abuse.
So in the end, we can’t have it both ways. We either accept stronger security—even if it's inconvenient—or we keep playing whack-a-mole with breaches and blaming whoever happens to get hit next.
Whatever worked 5 years ago will not take us further.
Host-C - VPS & Storage VPS Services – Reliable, Scalable and Fast - AS211462
"If there is no struggle there is no progress"
A data breach is annoying, but it can happen to anyone.
What defines a company is how they respond to it. ColonCrossing have pretty much lied from the start, still haven't actually bothered notifying everyone whose personal data was lost, and the few they have talked to seem to have got the message "ahh well it's working again, what you complaining about?"
I mean I always knew they were pretty bad, and only have stuff running with them because I won some free credits but if I'd ever actually paid them a cent, I'd be fuming.
ColonCleansing has never told the truth since its inception
Free Hosting at YetiNode | MicroNode| Cryptid Security | URL Shortener | LaunchVPS | ExtraVM | Host-C | In the Node, or Out of the Loop?
I partially disagree here. It is not only "lower priority" in software development world, it is lower priority for any business. There are for sure some exclusions but they are rare. What drives the business? Profit, and in the end it is features features features (if we are talking about any IT product). You can't "sell" proper security policies to the C-level. And security is what usually has the lowest budget.
Enforcing KYC is often done for compliance reasons (which is not a real security) and it is additional risks business must handle. Leaked emails and leaked IDs/SSNs are of very different severity.
Having KYC and caring abour customer data are different topics, so I am disagreeing completely here.
Check our KVM VPS plans in 🇵🇱 Warsaw, Poland and 🇸🇪 Stockholm, Sweden
is there a list somewhere of which hosts at LET are allowed to be hacked due to their own laziness, lose customer PII, lie about it, continue to lie once it's in the media, then keep their vendor account?
is it just:
?
maybe torchbyte
Imagine using CC in 2025. LoL. LMAO, even.
My pronouns are like/subscribe.
You need a ColonCleansing?
Free Hosting at YetiNode | MicroNode| Cryptid Security | URL Shortener | LaunchVPS | ExtraVM | Host-C | In the Node, or Out of the Loop?