Hacking Trust networks

Trust networks are built on relationships and association -  Photo by Zdeněk Macháček on Unsplash
Trust networks are built on relationships and association – Photo by Zdeněk Macháček on Unsplash

Hackers don’t just look for vulnerability, they prey on trust. When Twitter introduced the 140 character limit, it gave rise to new businesses – URL shorteners like bit.ly, which would convert those long URL’s into short 10-12 character links. URL shorteners work by acting as redirection points. They take a link, provide a unique id, and process it through their servers to point it to the original page. It became the easiest way to share interesting articles with friends and followers. The problem was that you no longer knew what you were clicking on because the original was masked.

Both vulnerability and trust need to work in tandem for hackers to succeed. Phishing scams where people unwittingly allowed their bank accounts to be drained happened because they trusted communication that seemed to originate from the bank. It’s an established trust network – ripe for exploitation. The same is now true of Twitter – millions of trusted tweets and all that needs to be done is to insert a link to malware somewhere in the stream. In this case, the link pointed to fake anti-virus software. Hackers have to use ingenuity, not just to code the virus but to foil its detection and enhance its spread.

The bait used exploits the most common human weaknesses. Like the one years ago, where people got ‘I Love You’ messages in their email. How many can resist that one, especially when it comes from an unknown source? Or even a known one, where the hackers got into mailboxes and then sent out requests for money to everyone in the address book. It takes years to build a trust network. And a handful of deviants can undermine that trust forever.

Yuvan Noah Hariri talks of Hacking humans

The ingenuity with which hackers use trust is covered in-depth in a blog post from Broadband Search. They research plans available from providers across the United States and list details including download speeds, upload speeds, pricing, data caps and importantly, the fine print, which should help prospects determine what works best for them

So why does a blog about branding talk about hacking? Brands are essentially built on trust. They build networks of consumers who buy into the same promise or benefit. Admittedly, it is a lower level of trust because they satisfy small slivers of need. But one only needs to look at the controversy created around Maggi noodles in India when it lost confidence owing to a series of exposes on the quality of the product. The fact that it recovered and is now back at the top is a lesson in how trust networks can be rebuilt