Skip to content

16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now

Technology
7 6 0
  • This post did not contain any content.
  • This post did not contain any content.

    What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

  • What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

    Clickbait from Forbes, with not a single mention of 2FA/Two Factor Auth?

    Link Preview Image

    Colour me not surprised.

  • This post did not contain any content.

    As far as I know, the passwords aren't stored in the databases, it's the hash produced by a one-way function that is stored in the database. Grabbing these is useless.

  • As far as I know, the passwords aren't stored in the databases, it's the hash produced by a one-way function that is stored in the database. Grabbing these is useless.

    Hashes can be brute forced, it's just normally too expensive to do so for any reasonably complex password. If you're using "password123" as your password even a hashed password is easily cracked (salting and peppering can help make this more difficult, although still not impossible).

  • What is this article? Besides terrible, I mean. This article is terrible.

    First of all, this isn't a new leak. It's not even a combination of old leaks. It's just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.

    According to Vilius Petkauskas at Cybernews, whose researchers have been investigating the leakage since the start of the year, “30 exposed datasets containing from tens of millions to over 3.5 billion records each,” have been discovered. In total, Petkauskas has confirmed, the number of compromised records has now hit 16 billion. Let that sink in for a bit.

    And to add insult to injury, the article has this gem:

    Is This The GOAT When It Comes To Passwords Leaking?

    Password compromise is no joke.

    Certainly not with writing like this.

    And spelling mistakes in an article from Forbes? Total garbage.

  • Hashes can be brute forced, it's just normally too expensive to do so for any reasonably complex password. If you're using "password123" as your password even a hashed password is easily cracked (salting and peppering can help make this more difficult, although still not impossible).

    I'm perfectly aware anything can be brute forced and that's why it doesn't worth to mention. Now, the amount of resources required to brute force a hashed password has nothing to do with the complexity of the password. No matter what the password is, the hash will have a fixed length and appear as a random sequence of bytes. Otherwise you are not doing it properly.

    The complexity of the password has something to do with guessing the password from dictionary or known most common passwords.

  • 366 Stimmen
    27 Beiträge
    0 Aufrufe
    P
    They're like "Wahhh we need to hit 3.5% and then the fascist dictator will totally resign!" and then Trump is like "Oooo my delicate little feefees, oh well, here comes my Gestapo!" while the 50501 protest marshalls chant "We did it! We don't need crushing violence to make a change!" while completely ignoring that the NKD protests accomplished literally nothing.
  • 72 Stimmen
    12 Beiträge
    0 Aufrufe
    C
    Because that worked so well for South Korea
  • Is the ‘tech bro-ification’ of abortion here?

    Technology technology
    15
    1
    69 Stimmen
    15 Beiträge
    3 Aufrufe
    T
    Nah. Been working in tech for nearly 30 years, "tech bro" is a delineation. Keeps the fuckers from smearing the rest of us
  • Android 16 is here

    Technology technology
    73
    1
    146 Stimmen
    73 Beiträge
    1 Aufrufe
    bjoern_tantau@swg-empire.deB
    [image: be056f6c-6ffe-4ecf-a137-9af60aef4d90.png] You people are getting updates? I really hate that I cannot just do everything with the pocket computer I own that is running a supposedly free operating system.
  • 7 Stimmen
    14 Beiträge
    2 Aufrufe
    G
    A carrot perhaps... Or a very big stick.
  • AI cheating surge pushes schools into chaos

    Technology technology
    25
    45 Stimmen
    25 Beiträge
    3 Aufrufe
    C
    Sorry for the late reply, I had to sit and think on this one for a little bit. I think there are would be a few things going on when it comes to designing a course to teach critical thinking, nuances, and originality; and they each have their own requirements. For critical thinking: The main goal is to provide students with a toolbelt for solving various problems. Then instilling the habit of always asking "does this match the expected outcome? What was I expecting?". So usually courses will be setup so students learn about a tool, practice using the tool, then have a culminating assignment on using all the tools. Ideally, the problems students face at the end require multiple tools to solve. Nuance mainly naturally comes with exposure to the material from a professional - The way a mechanical engineer may describe building a desk will probably differ greatly compared to a fantasy author. You can also explain definitions and industry standards; but thats really dry. So I try to teach nuances via definitions by mixing in the weird nuances as much as possible with jokes. Then for originality; I've realized I dont actually look for an original idea; but something creative. In a classroom setting, you're usually learning new things about a subject so a student's knowledge of that space is usually very limited. Thus, an idea that they've never heard about may be original to them, but common for an industry expert. For teaching originality creativity, I usually provide time to be creative & think, and provide open ended questions as prompts to explore ideas. My courses that require originality usually have it as a part of the culminating assignment at the end where they can apply their knowledge. I'll also add in time where students can come to me with preliminary ideas and I can provide feedback on whether or not it passes the creative threshold. Not all ideas are original, but I sometimes give a bit of slack if its creative enough. The amount of course overhauling to get around AI really depends on the material being taught. For example, in programming - you teach critical thinking by always testing your code, even with parameters that don't make sense. For example: Try to add 123 + "skibbidy", and see what the program does.
  • 77 Stimmen
    22 Beiträge
    3 Aufrufe
    F
    https://web.archive.org/web/20250526132003/https://www.yahoo.com/news/cias-communications-suffered-catastrophic-compromise-started-iran-090018710.html?ref=404media.co
  • 406 Stimmen
    83 Beiträge
    24 Aufrufe
    J
    Of course they don't click anything. Google search has just become a front-end for Gemini, the answer is "served" up right at the top and most people will just take that for Gospel.