Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 18 May 2016 11:11:43 +0200
From: Per Thorsheim <per@...rsheim.net>
To: passwords@...ts.openwall.com
Subject: Complete Linkedin breach from 2012 up for sale

http://motherboard.vice.com/read/another-day-another-hack-117-million-linkedin-emails-and-password

Finally (?), the full extent of the 2012 breach appears online. 117
million emails + unsalted sha-1 up for sale.

Compared to the Rockyou list I would consider this dataset a lot more
useful for research purposes. Just the ability to do a non-case
substring search of names / emails in the passwords is very tempting,
and even in 2012 Linkedin had a stricter password policy than that of
the Rockyou leak.


-- 
Best regards,
Per Thorsheim
CISA, CISM, CISSP, ISSAP
Founder of PasswordsCon.org
CEO of godpraksis.no
Phone: +47 90 99 92 59
Twitter: @thorsheim

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.