Feeds

F1 secrets left on the web

Uncensored transcript posted online

Build a business case: developing custom apps

Highly-sensitive documents that disclosed secret information about the inner workings of the technical strategies adopted by rival Formula One (F1) teams were exposed for all to see on the internet.

Over the past few months F1 motor racing has been racked by controversy surrounding revelations that the McLaren team had been spying on its rival Ferrari by obtaining confidential technical documents.

Just last week, McLaren was fined $100m (£50m) and stripped of all its constructors' championship points.

The verdict followed several hearings where emails and texts between the men at the centre of the drama were used as evidence in the much-publicised case.

Fédération Internationale de l' Automobile (FIA) diligently published transcripts from those hearings on its website including a 115-page document released on 13 September, the day the McLaren verdict was reached.

But, despite blacking out secret information on the PDF transcript before posting it on the internet, the French-based motor sport council failed to realise that a simple copy and paste of the document into any text-based file revealed the hidden data.

El Reg contacted the FIA to point out the glaring mistake and a spokeswoman told us the PR team was already aware of the privacy cock-up.

She said the document had in fact been taken down from the website immediately after the FIA learned of the issue yesterday. However, we were still able to obtain the document, including its confidential revelations, this morning.

When asked why the FIA had failed to act quickly to prevent rival F1 teams accessing some of the information allegedly exposed to McLaren in the espionage saga, the spokeswoman said the council was unwilling to provide any further comment.

Of course, following our conversation, the document was edited with the secret information removed. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Plug and PREY: Hackers reprogram USB drives to silently infect PCs
BadUSB instructs gadget chips to inject key-presses, redirect net traffic and more
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?