|
Message-ID: <d854c46b-c634-79c4-4b0a-5d6b2e797f62@thorsheim.net> Date: Wed, 18 May 2016 11:11:43 +0200 From: Per Thorsheim <per@...rsheim.net> To: passwords@...ts.openwall.com Subject: Complete Linkedin breach from 2012 up for sale http://motherboard.vice.com/read/another-day-another-hack-117-million-linkedin-emails-and-password Finally (?), the full extent of the 2012 breach appears online. 117 million emails + unsalted sha-1 up for sale. Compared to the Rockyou list I would consider this dataset a lot more useful for research purposes. Just the ability to do a non-case substring search of names / emails in the passwords is very tempting, and even in 2012 Linkedin had a stricter password policy than that of the Rockyou leak. -- Best regards, Per Thorsheim CISA, CISM, CISSP, ISSAP Founder of PasswordsCon.org CEO of godpraksis.no Phone: +47 90 99 92 59 Twitter: @thorsheim
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.