Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <573C32DF.5040500@bestmx.net>
Date: Wed, 18 May 2016 11:16:15 +0200
From: "e@...tmx.net" <e@...tmx.net>
To: passwords@...ts.openwall.com
Subject: Re: Complete Linkedin breach from 2012 up for sale

On 05/18/2016 11:11 AM, Per Thorsheim wrote:
> http://motherboard.vice.com/read/another-day-another-hack-117-million-linkedin-emails-and-password
>
> Finally (?), the full extent of the 2012 breach appears online. 117
> million emails + unsalted sha-1 up for sale.
>
> Compared to the Rockyou list I would consider this dataset a lot more
> useful for research purposes. Just the ability to do a non-case
> substring search of names / emails in the passwords is very tempting,
> and even in 2012 Linkedin had a stricter password policy than that of
> the Rockyou leak.
>
>

in a perfect harmony with the previous post (how easy it is to trick a 
user into compromising of his password)
nobody is concerned about linkedin tricking users to betray their email 
passwords to linkedin.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.