Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 18 May 2016 11:16:15 +0200
From: "" <>
Subject: Re: Complete Linkedin breach from 2012 up for sale

On 05/18/2016 11:11 AM, Per Thorsheim wrote:
> Finally (?), the full extent of the 2012 breach appears online. 117
> million emails + unsalted sha-1 up for sale.
> Compared to the Rockyou list I would consider this dataset a lot more
> useful for research purposes. Just the ability to do a non-case
> substring search of names / emails in the passwords is very tempting,
> and even in 2012 Linkedin had a stricter password policy than that of
> the Rockyou leak.

in a perfect harmony with the previous post (how easy it is to trick a 
user into compromising of his password)
nobody is concerned about linkedin tricking users to betray their email 
passwords to linkedin.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.