Date: Wed, 18 May 2016 11:16:15 +0200 From: "e@...tmx.net" <e@...tmx.net> To: passwords@...ts.openwall.com Subject: Re: Complete Linkedin breach from 2012 up for sale On 05/18/2016 11:11 AM, Per Thorsheim wrote: > http://motherboard.vice.com/read/another-day-another-hack-117-million-linkedin-emails-and-password > > Finally (?), the full extent of the 2012 breach appears online. 117 > million emails + unsalted sha-1 up for sale. > > Compared to the Rockyou list I would consider this dataset a lot more > useful for research purposes. Just the ability to do a non-case > substring search of names / emails in the passwords is very tempting, > and even in 2012 Linkedin had a stricter password policy than that of > the Rockyou leak. > > in a perfect harmony with the previous post (how easy it is to trick a user into compromising of his password) nobody is concerned about linkedin tricking users to betray their email passwords to linkedin.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.