Have you signed up for an ObamaCARE state exchange in Minnesota, Hawaii, Nevada, Colorado, New Mexico, New York, Maryland or Washington DC? If so, you should be happy to know that your personal information sent to the state (or DC) ObamaCARE exchanges are vulnerable to being exposed. A simple Wi-FiM attack can allow hackers (or whatever they are called now) to grab your private information and usernames/passwords. This isn’t even including the security problems at healthcare.gov. On top of all this, Google, who is hosting these sites is reportedly collecting MAC addresses to identify your computer/router.
Multiple state-run health-care exchanges are vulnerable to a type of Wi-Fi attack that can allow hackers to intercept usernames and passwords.
According to Mark Lanterman, the CEO and chief technology officer of Computer Forensic Services who ran the simulated attack for KSTP, state-run exchanges in Minnesota, Hawaii, Nevada, Colorado, New Mexico, New York, Maryland, and the District of Columbia are vulnerable to it.
KSTP also reports that during the period that HealthCare.gov was hosted by servers owned by Google, the tech giant appeared to be capturing MAC addresses—reporter Nick Winkler characterizes them as “computer fingerprints”—which can identify individual computers.
“It seems weird to me,” Lanterman told KSTP. “I’m a little bit troubled by it. It’s not something that would ordinarily be collected, so someone had to make a decision to collect it.”
Google has been unwilling to speak with KSTP about the collection of MAC addresses.