Skip to content

16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now

Technology
7 6 0
  • This post did not contain any content.
  • This post did not contain any content.

    What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

  • What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

    Clickbait from Forbes, with not a single mention of 2FA/Two Factor Auth?

    Link Preview Image

    Colour me not surprised.

  • This post did not contain any content.

    As far as I know, the passwords aren't stored in the databases, it's the hash produced by a one-way function that is stored in the database. Grabbing these is useless.

  • As far as I know, the passwords aren't stored in the databases, it's the hash produced by a one-way function that is stored in the database. Grabbing these is useless.

    Hashes can be brute forced, it's just normally too expensive to do so for any reasonably complex password. If you're using "password123" as your password even a hashed password is easily cracked (salting and peppering can help make this more difficult, although still not impossible).

  • What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

    And spelling mistakes in an article from Forbes? Total garbage.

  • Hashes can be brute forced, it's just normally too expensive to do so for any reasonably complex password. If you're using "password123" as your password even a hashed password is easily cracked (salting and peppering can help make this more difficult, although still not impossible).

    I'm perfectly aware anything can be brute forced and that's why it doesn't worth to mention. Now, the amount of resources required to brute force a hashed password has nothing to do with the complexity of the password. No matter what the password is, the hash will have a fixed length and appear as a random sequence of bytes. Otherwise you are not doing it properly.

    The complexity of the password has something to do with guessing the password from dictionary or known most common passwords.

  • The Trump Mobile T1 Phone looks both bad and impossible

    Technology technology
    42
    1
    140 Stimmen
    42 Beiträge
    1 Aufrufe
    S
    "Components" means in this case the phone and the sticker.
  • 68 Stimmen
    4 Beiträge
    1 Aufrufe
    jimmydoreisalefty@lemmy.worldJ
    Damn, I heard this mentioned somewhere as well! I don't remember where, though... The CIA is also involved with the cartels in Mexico as well as certain groups in the Middle East. They like to bring "democracy" to many countries that won't become a pawn of the Western regime.
  • Power-Hungry Data Centers Are Warming Homes in Nordic Countries

    Technology technology
    3
    1
    12 Stimmen
    3 Beiträge
    3 Aufrufe
    T
    This is also a thing in Denmark. It's required by law to even build a data center.
  • 1 Stimmen
    15 Beiträge
    5 Aufrufe
    G
    I’m in the EU and PII definitely IS “a thing” here, Then let me be more clear: It is not a thing in EU law. With due respect, the level of intellectual functioning, in this case reading comprehension, you display is incompatible with being an IT professional in any country. If you are not trolling, then you should consult a physician.
  • 0 Stimmen
    17 Beiträge
    7 Aufrufe
    F
    You seem to think we disagree on creation of a police state or massive surveillance system being a bad thing for some reason. None of which are stopped with regulations by the states that are funding and building said things ...
  • 13 Stimmen
    6 Beiträge
    7 Aufrufe
    rinse@lemmy.worldR
    Protocol implementation plebbit-js is separated from client like Seedit
  • CrowdStrike Announces Layoffs Affecting 500 Employees

    Technology technology
    8
    1
    243 Stimmen
    8 Beiträge
    5 Aufrufe
    S
    This is where the magic of near meaningless corpo-babble comes in. The layoffs are part of a plan to aspirationally acheive the goal of $10b revenue by EoY 2025. What they are actually doing is a significant restructuring of the company, refocusing by outside hiring some amount of new people to lead or be a part of departments or positions that haven't existed before, or are being refocused to other priorities... ... But this process also involves laying off 500 of the 'least productive' or 'least mission critical' employees. So, technically, they can, and are, arguing that their new organizational paradigm will be so succesful that it actually will result in increased revenue, not just lower expenses. Generally corpos call this something like 'right-sizing' or 'refocusing' or something like that. ... But of course... anyone with any actual experience with working at a place that does this... will tell you roughly this is what happens: Turns out all those 'grunts' you let go of, well they actually do a lot more work in a bunch of weird, esoteric, bandaid solutions to keep everything going, than upper management was aware of... because middle management doesn't acknowledge or often even understand that that work was being done, because they are generally self-aggrandizing narcissist petty tyrants who spend more time in meetings fluffing themselves up than actually doing any useful management. Then, also, you are now bringing on new, outside people who look great on paper, to lead new or modified apartments... but they of course also do not have any institutional knowledge, as they are new. So now, you have a whole bunch of undocumented work that was being done, processes which were being followed... which is no longer being done, which is not documented.... and the new guys, even if they have the best intentions, now have to spend a quarter or two or three figuring out just exactly how much pre-existing middle management has been bullshitting about, figuring out just how much things do not actually function as they ssid it did... So now your efficiency improving restructuring is actually a chaotic mess. ... Now, this 'right sizing' is not always apocalyptically extremely bad, but it is also essentially never totally free from hiccups... and it increases stress, workload, and tensions between basically everyone at the company, to some extent. Here's Forbes explanation of this phenomenon, if you prefer an explanation of right sizing in corpospeak: https://www.forbes.com/advisor/business/rightsizing/
  • 33 Stimmen
    8 Beiträge
    4 Aufrufe
    J
    Apparently, it was required to be allowed in that state: Reading a bit more, during the sentencing phase in that state people making victim impact statements can choose their format for expression, and it's entirely allowed to make statements about what other people would say. So the judge didn't actually have grounds to deny it. No jury during that phase, so it's just the judge listening to free form requests in both directions. It's gross, but the rules very much allow the sister to make a statement about what she believes her brother would have wanted to say, in whatever format she wanted. From: https://sh.itjust.works/comment/18471175 influence the sentence From what I've seen, to be fair, judges' decisions have varied wildly regardless, sadly, and sentences should be more standardized. I wonder what it would've been otherwise.