Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Lady Luck brings added income today. Lady friend takes it away tonight.


comp / comp.mobile.android / Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever

SubjectAuthor
* RockYou2024 leak of 10 billion passwords - the biggest password leak everMickey D
+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everGordinator
||+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everBill Powell
|||`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
||`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
||`* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|| +- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAndrew
|| `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
||  `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
||   `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
||    `- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everWoozy Song
`* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
 `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everNick Cine
  +* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everbadgolferman
  |`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
  +* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
  |`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everNick Cine
  `- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz

1
Subject: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Mickey D
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Sat, 6 Jul 2024 23:28 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!newsfeed.endofthelinebbs.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: mickeydavis078XX@ptd.net (Mickey D)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Sat, 6 Jul 2024 19:28:12 -0400
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 6 Jul 2024 23:28:13 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="62240"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: MT-NewsWatcher/3.5.3b3 (Intel Mac OS X)
Cancel-Lock: sha1:6E9l84FbBeluJEvfCL3pl6oXtKQ= sha256:49yLb45O4rFbc0auqGVlKKTOVHhp5mv2a1fY5ceFS5U=
sha1:jI8iZMnbUal/MlR/n5fPZjmXOQ8= sha256:jD+dvJayiGCoQSgGGa0dGY2hJALzMgL+0I2ciQSfuwA=
View all headers

RockYou2024 leak of 10 billion passwords - the biggest password leak ever
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
https://mashable.com/article/rockyou2024-leaked-password-database

Cybernews researchers discovered what appears to be the largest password
compilation with a staggering 9,948,575,739 unique plaintext passwords. The
file with the data, titled rockyou2024.txt, was posted on July 4th by forum
user ObamaCare.

While the user registered in late May 2024, they have previously shared an
employee database from the law firm Simmons & Simmons, a lead from an
online casino AskGamblers, and student applications for Rowan College at
Burlington County.

The team cross-referenced the passwords included in the RockYou2024 leak
with data from Cybernews' Leaked Password Checker, which revealed that
these passwords came from a mix of old and new data breaches.

"In its essence, the RockYou2024 leak is a compilation of real-world
passwords used by individuals all over the world. Revealing that many
passwords for threat actors substantially heightens the risk of credential
stuffing attacks," researchers said.

Credential stuffing attacks can be severely damaging for users and
businesses. For example, a recent wave of attacks targeting Santander,
Ticketmaster, Advance Auto Parts, QuoteWizard, and others was a direct
result of credential stuffing attacks against the victims' cloud service
provider, Snowflake.

"Threat actors could exploit the RockYou2024 password compilation to
conduct brute-force attacks and gain unauthorized access to various online
accounts used by individuals who employ passwords included in the dataset,"
the team explained.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 11:26 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!nntp.comgw.net!peer01.ams4!peer.am4.highwinds-media.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx12.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 29
Message-ID: <FXuiO.11411$6eV2.2097@fx12.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 11:26:29 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 07:26:29 -0400
X-Received-Bytes: 1865
View all headers

On 2024-07-06 19:28, Mickey D wrote:
>
> "Threat actors could exploit the RockYou2024 password compilation to
> conduct brute-force attacks and gain unauthorized access to various online
> accounts used by individuals who employ passwords included in the dataset,"
> the team explained.

Why Passkeys should be used wherever financial transactions or sensitive
information are concerned. Or at least TFA.

And passwords need to be strong - computer generated is always best.

Otherwise password access should have time outs.

1st time wrong: no delay
2nd time wrong: 1 s delay
3rt time wrong: 2 s delay
4th time wrong: 4 s
5 8 s

10 4 hour delay, then reset to 0 delay.

Brute force login attacks would simply not work.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Gordinator
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: usenet-news.net
Date: Sun, 7 Jul 2024 17:27 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
Content-Language: en-US
From: gordinator@gordinator.org (Gordinator)
In-Reply-To: <FXuiO.11411$6eV2.2097@fx12.iad>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 45
Message-ID: <WdAiO.48082$CGs.37472@fx06.ams4>
X-Complaints-To: abuse@usenet-news.net
NNTP-Posting-Date: Sun, 07 Jul 2024 17:27:18 UTC
Organization: usenet-news.net
Date: Sun, 7 Jul 2024 18:27:18 +0100
X-Received-Bytes: 2702
View all headers

On 07/07/2024 12:26, Alan Browne wrote:
> On 2024-07-06 19:28, Mickey D wrote:
>>
>> "Threat actors could exploit the RockYou2024 password compilation to
>> conduct brute-force attacks and gain unauthorized access to various
>> online
>> accounts used by individuals who employ passwords included in the
>> dataset,"
>> the team explained.
>
> Why Passkeys should be used wherever financial transactions or sensitive
> information are concerned.  Or at least TFA.
>
> And passwords need to be strong - computer generated is always best.
>
> Otherwise password access should have time outs.
>
> 1st time wrong: no delay
> 2nd time wrong: 1 s delay
> 3rt time wrong: 2 s delay
> 4th time wrong: 4 s
> 5               8 s
>
> 10              4 hour delay, then reset to 0 delay.
>
> Brute force login attacks would simply not work.
>

A better solution would be to use a hashing algorithm like Argon2 that
is designed to be resistant to such attacks. That way, if you get
offline access to a database somehow - which is how these passwords were
derived - cracking takes a stupid amount of time.

Such modern algorithms use things like salting by default as well, which
eliminates rainbow table attacks (pre-computed lists of hashes and their
passwords), meaning you need to perform the slow and expensive
brute-force method.

Also, a timeout would only help with online logins. Offline ones are the
real deal, because you can go ham with no consequence.

That said, your idea of using computer-generated passwords is great. I
use 64-character random passwords generated by KeePassXC. It works
great, except for the websites that want shorter passwords, for some
bizarre reason.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Bill Powell
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: Hispagatos.org
Date: Sun, 7 Jul 2024 19:03 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.hispagatos.org!.POSTED!not-for-mail
From: bill@anarchists.org (Bill Powell)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Sun, 7 Jul 2024 21:03:00 +0200
Organization: Hispagatos.org
Message-ID: <v6eop3$1e9q0$1@matrix.hispagatos.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 7 Jul 2024 19:02:59 -0000 (UTC)
Injection-Info: matrix.hispagatos.org;
logging-data="1517376"; mail-complaints-to="abuse@hispagatos.org"
User-Agent: XanaNews/1.19.1.372 (x86; Portable ISpell)
View all headers

On Sun, 7 Jul 2024 18:27:18 +0100, Gordinator wrote:

> A better solution would be to use a hashing algorithm like Argon2 that
> is designed to be resistant to such attacks.

Can someone who knows let me know WHAT was published online?

Is it people's login and passwords?
Or just a long list of people's passwords?

If it's just a long list of passwords, what good is that?
A dictionary like lookup would work as well, wouldn't it?

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 21:27 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
<v6eop3$1e9q0$1@matrix.hispagatos.org>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6eop3$1e9q0$1@matrix.hispagatos.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 24
Message-ID: <%KDiO.1909$qFQd.1795@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 21:27:23 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 17:27:23 -0400
X-Received-Bytes: 1822
View all headers

On 2024-07-07 15:03, Bill Powell wrote:

> Can someone who knows let me know WHAT was published online?
>
> Is it people's login and passwords?
> Or just a long list of people's passwords?
>
> If it's just a long list of passwords, what good is that?
> A dictionary like lookup would work as well, wouldn't it?

It's just a list of passwords.

Depends on what you mean by "dictionary" as the password list won't have
things that are in any given dictionary (no matter what the kind).

It is usable to verify that your password is not "in there". I wrote a
quick program to do just that - but my passwords are too ridiculous -
never mind anyone figuring the login name and where it's being used.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 21:30 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <WdAiO.48082$CGs.37472@fx06.ams4>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 66
Message-ID: <BNDiO.1910$qFQd.566@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 21:30:09 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 17:30:09 -0400
X-Received-Bytes: 3479
View all headers

On 2024-07-07 13:27, Gordinator wrote:
> On 07/07/2024 12:26, Alan Browne wrote:
>> On 2024-07-06 19:28, Mickey D wrote:
>>>
>>> "Threat actors could exploit the RockYou2024 password compilation to
>>> conduct brute-force attacks and gain unauthorized access to various
>>> online
>>> accounts used by individuals who employ passwords included in the
>>> dataset,"
>>> the team explained.
>>
>> Why Passkeys should be used wherever financial transactions or
>> sensitive information are concerned.  Or at least TFA.
>>
>> And passwords need to be strong - computer generated is always best.
>>
>> Otherwise password access should have time outs.
>>
>> 1st time wrong: no delay
>> 2nd time wrong: 1 s delay
>> 3rt time wrong: 2 s delay
>> 4th time wrong: 4 s
>> 5               8 s
>>
>> 10              4 hour delay, then reset to 0 delay.
>>
>> Brute force login attacks would simply not work.
>>
>
> A better solution would be to use a hashing algorithm like Argon2 that
> is designed to be resistant to such attacks. That way, if you get
> offline access to a database somehow - which is how these passwords were
> derived - cracking takes a stupid amount of time.

Having such a list won't help against such.

> Such modern algorithms use things like salting by default as well, which
> eliminates rainbow table attacks (pre-computed lists of hashes and their
> passwords), meaning you need to perform the slow and expensive
> brute-force method.

Indeed, but the issue is the brute force from the outside. (Which also
needs a target site and account name ... already getting very unlikely).

>
> Also, a timeout would only help with online logins. Offline ones are the
> real deal, because you can go ham with no consequence.

That implies they've copied an entire system and are going after info in
it. Since the pw database is (as you mention salted an encrypted) such
an attack will go exactly nowhere with the passwords in the list - esp.
when the salt is derived from other customer data.

> That said, your idea of using computer-generated passwords is great. I
> use 64-character random passwords generated by KeePassXC. It works
> great, except for the websites that want shorter passwords, for some
> bizarre reason.

64 char is overkill. 20 char is much more than sufficient assuming it's
random.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Sun, 7 Jul 2024 21:39 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Sun, 7 Jul 2024 21:39:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v6f1u3$gh46$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 07 Jul 2024 23:39:15 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="b634725a5483ddce92b67cd331d52ac8";
logging-data="541830"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+1411v2e1Te2b7Kl0VPGyi3XNz7psKQkM="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:6bqfXxcwaHjnTixMVP0Vj0aXT/w=
sha1:uIiZ1/SS1gkWnSBMK6Qi++qz1mk=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-06 19:28, Mickey D wrote:
>>
>> "Threat actors could exploit the RockYou2024 password compilation to
>> conduct brute-force attacks and gain unauthorized access to various online
>> accounts used by individuals who employ passwords included in the dataset,"
>> the team explained.
>
> Why Passkeys should be used wherever financial transactions or sensitive
> information are concerned. Or at least TFA.

Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
for.

It would certainly crystallise minds if companies risked fines of 10% of
global turnover.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 22:40 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.chmurka.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx13.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6f1u3$gh46$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 30
Message-ID: <SPEiO.13229$3zB6.6414@fx13.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 22:40:50 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 18:40:50 -0400
X-Received-Bytes: 2052
View all headers

On 2024-07-07 17:39, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-06 19:28, Mickey D wrote:
>>>
>>> "Threat actors could exploit the RockYou2024 password compilation to
>>> conduct brute-force attacks and gain unauthorized access to various online
>>> accounts used by individuals who employ passwords included in the dataset,"
>>> the team explained.
>>
>> Why Passkeys should be used wherever financial transactions or sensitive
>> information are concerned. Or at least TFA.
>
> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
> for.
>
> It would certainly crystallise minds if companies risked fines of 10% of
> global turnover.

I don't disagree with what you wish, but it will have 0 effect on people
with bad security practices and 0 effect on criminals attempting to
break into systems.

The internet grew up from nothing to everywhere all at once and the
security implications lagged that by near 20 years.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Andrew
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Mon, 8 Jul 2024 02:18 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!news-out.netnews.com!s1-3.netnews.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Mon, 8 Jul 2024 02:18:26 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v6fi9h$nle$1@nnrp.usenet.blueworldhosting.com>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me> <SPEiO.13229$3zB6.6414@fx13.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 8 Jul 2024 02:18:26 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="24238"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:ksEQYri7/rPw2h92CixI1SEVEH0= sha256:FG8wQvLFYnJRhXKvmGsGFDEy98axkn7QatPftDoh/3Y=
sha1:giD3mDkmBG0f7K/xpxtZCfr3nlE= sha256:Q4JciwOh30ozyfTiouEeYbpDU4IoNDy+QtFPo+Pf2B4=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
X-Received-Bytes: 2601
Lines: 29
View all headers

Alan Browne wrote on Sun, 7 Jul 2024 18:40:50 -0400 :

> it will have 0 effect on people with bad security practices

The problem is lots of people have no good way to remember passwords.

What I do, for example, is:
1. I store passwords in a cross-platform encrypted desktop manager
(KeepassXC)

2. I sync the kdbx database periodically keeping the master on the PC.
Note that my passwords almost never are changed on a mobile device.

3. Every platform has a free program to read that kdbx file, I think.
For example, Windows, Linux & macOS can use the KeepassXC passwd mgr.
<https://keepassxc.org/download/>

Android uses, for example, Keepass2Android, but others exist.
<https://play.google.com/store/apps/details?id=keepass2android.keepass2android>

iOS uses KeePassium for example, but others also likely exist.
<https://apps.apple.com/us/app/keepassium-keepass-passwords/id1435127111>

Each time I'm forced to create a login/passwd combination, I type "vipw"
which, on Windows, has for decades, brought up the native password manager.

Each time I need a login/password, I also type "vipw" into Windows, and up
comes that same password manager, with the sort order usually set to LIFO.

But how many people do that?

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Mon, 8 Jul 2024 07:59 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Mon, 8 Jul 2024 07:59:52 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 41
Message-ID: <v6g69o$po0q$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
<v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 08 Jul 2024 09:59:52 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="effaeb9d21dbd0aea9666f8d88857116";
logging-data="843802"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX183SrXz8erYnynez3HdGUMQ0b1FJ1WymD8="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:W3CmfWHopS0V7Mw6KP33OL1HfiM=
sha1:J9u6asDWUayUDX9gOzi79BtnFCQ=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-07 17:39, Chris wrote:
>> Alan Browne <bitbucket@blackhole.com> wrote:
>>> On 2024-07-06 19:28, Mickey D wrote:
>>>>
>>>> "Threat actors could exploit the RockYou2024 password compilation to
>>>> conduct brute-force attacks and gain unauthorized access to various online
>>>> accounts used by individuals who employ passwords included in the dataset,"
>>>> the team explained.
>>>
>>> Why Passkeys should be used wherever financial transactions or sensitive
>>> information are concerned. Or at least TFA.
>>
>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
>> for.
>>
>> It would certainly crystallise minds if companies risked fines of 10% of
>> global turnover.
>
> I don't disagree with what you wish, but it will have 0 effect on people
> with bad security practices

I disagree. It will help proactively protect them from themselves. Unlike
the current system in the US where the only response is reactively via law
suits years after people's lives have been affected.

> and 0 effect on criminals attempting to
> break into systems.

Again, disagree. If an org is forced to comply with stricter regulations
regarding data security then that will automatically reduce the target
surface.

However, criminals can be very smart and will change tactics.

> The internet grew up from nothing to everywhere all at once and the
> security implications lagged that by near 20 years.

Which is why we're now seeing more social engineering attacks nowadays that
technical attacks. I'm far less worried about malware today than I used to
be.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Tue, 9 Jul 2024 12:02 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!2.eu.feeder.erje.net!feeder.erje.net!feeder1-2.proxad.net!proxad.net!feeder1-1.proxad.net!193.141.40.65.MISMATCH!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx14.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad> <v6g69o$po0q$1@dont-email.me>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6g69o$po0q$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 59
Message-ID: <eF9jO.37835$%gXc.3496@fx14.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Tue, 09 Jul 2024 12:02:18 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Tue, 9 Jul 2024 08:02:18 -0400
X-Received-Bytes: 3272
View all headers

On 2024-07-08 03:59, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-07 17:39, Chris wrote:
>>> Alan Browne <bitbucket@blackhole.com> wrote:

>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>> information are concerned. Or at least TFA.
>>>
>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>> for.
>>>
>>> It would certainly crystallise minds if companies risked fines of 10% of
>>> global turnover.
>>
>> I don't disagree with what you wish, but it will have 0 effect on people
>> with bad security practices
>
> I disagree. It will help proactively protect them from themselves. Unlike
> the current system in the US where the only response is reactively via law
> suits years after people's lives have been affected.

You're talking about "personal privacy laws" which is not directly
related to computer security. One is policy implementation the other is
security implementation.

>> and 0 effect on criminals attempting to
>> break into systems.
>
> Again, disagree. If an org is forced to comply with stricter regulations
> regarding data security then that will automatically reduce the target
> surface.

Now you changed gears (was: [AAA] "personal privacy").

>
> However, criminals can be very smart and will change tactics.

The most successful side is phishing in one form or another - and that
will never stop.

Still - poking around for system security weaknesses will never stop.

Main things server side is _at least_ TFA and better: Passkeys.

>> The internet grew up from nothing to everywhere all at once and the
>> security implications lagged that by near 20 years.
>
> Which is why we're now seeing more social engineering attacks nowadays that
> technical attacks. I'm far less worried about malware today than I used to
> be.

Yet, they hackers keep hacking. And don't forget that any new website
implementation might be especially weak.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Tue, 9 Jul 2024 22:30 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Tue, 9 Jul 2024 22:30:18 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 45
Message-ID: <v6kdlq$1iard$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
<v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad>
<v6g69o$po0q$1@dont-email.me>
<eF9jO.37835$%gXc.3496@fx14.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 00:30:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="89b34a3dd57c95a3b97f4789ffa5e6c2";
logging-data="1649517"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18C2pQb0Ul+DP5DTxvbYT6yj7uzXbPNqcY="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:K+81WxCANLZjnzguoFpT/1aBI7U=
sha1:ioJgkm8V1cjrfl3SBt3Z4m/FEU8=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-08 03:59, Chris wrote:
>> Alan Browne <bitbucket@blackhole.com> wrote:
>>> On 2024-07-07 17:39, Chris wrote:
>>>> Alan Browne <bitbucket@blackhole.com> wrote:
>
>>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>>> information are concerned. Or at least TFA.
>>>>
>>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>>> for.
>>>>
>>>> It would certainly crystallise minds if companies risked fines of 10% of
>>>> global turnover.
>>>
>>> I don't disagree with what you wish, but it will have 0 effect on people
>>> with bad security practices
>>
>> I disagree. It will help proactively protect them from themselves. Unlike
>> the current system in the US where the only response is reactively via law
>> suits years after people's lives have been affected.
>
> You're talking about "personal privacy laws" which is not directly
> related to computer security.

We're talking about data protection - I miswrote when I said personal
privacy - laws. Which for personal digital data requires appropriate
computer security on the side of the data organisation.

> One is policy implementation the other is
> security implementation.

They're part of the same process.

>>> and 0 effect on criminals attempting to
>>> break into systems.
>>
>> Again, disagree. If an org is forced to comply with stricter regulations
>> regarding data security then that will automatically reduce the target
>> surface.
>
> Now you changed gears (was: [AAA] "personal privacy").

I didn't mention AAA. I mentioned EU and by implication, GDPR.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Woozy Song
Newsgroups: comp.mobile.android, alt.os.linux, alt.privacy
Organization: A noiseless patient Spider
Date: Wed, 10 Jul 2024 03:36 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: suzyw0ng@outlook.com (Woozy Song)
Newsgroups: comp.mobile.android,alt.os.linux,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 11:36:35 +0800
Organization: A noiseless patient Spider
Lines: 30
Message-ID: <v6kvk3$1okbu$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 05:36:36 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="dc0dd40162047cefe1d5d839389c4dd1";
logging-data="1855870"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18G0pYZ92SatT/ZxobD7Z8VXtyYV50xXDM="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
Firefox/91.0 SeaMonkey/2.53.18.2
Cancel-Lock: sha1:aT5kmRLJbZu4KDoFyZgIuvUZWLA=
In-Reply-To: <FXuiO.11411$6eV2.2097@fx12.iad>
View all headers

Alan Browne wrote:
> On 2024-07-06 19:28, Mickey D wrote:
>>
>> "Threat actors could exploit the RockYou2024 password compilation to
>> conduct brute-force attacks and gain unauthorized access to various
>> online
>> accounts used by individuals who employ passwords included in the
>> dataset,"
>> the team explained.
>
> Why Passkeys should be used wherever financial transactions or sensitive
> information are concerned.  Or at least TFA.
>
> And passwords need to be strong - computer generated is always best.
>
> Otherwise password access should have time outs.
>
> 1st time wrong: no delay
> 2nd time wrong: 1 s delay
> 3rt time wrong: 2 s delay
> 4th time wrong: 4 s
> 5               8 s
>
> 10              4 hour delay, then reset to 0 delay.
>
> Brute force login attacks would simply not work.
>

My car radio had that in 1990s, enter the PIN wrong and delay increased
each time.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 09:21 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 11:21:31 +0200
Organization: Camembert Normand au Lait Cru
Lines: 11
Message-ID: <v6ljqr$1rgur$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 10 Jul 2024 11:21:31 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="f608d4327c4234673cbba005bd9990d0";
logging-data="1950683"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19o2qNQBgEFyZm/9sOuX6s9fMRHW4WU2/E="
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:115.0) Gecko/20100101
Thunderbird/115.12.2
Cancel-Lock: sha1:9UxN0N4twD69rrPYVGIdmz4op5g=
In-Reply-To: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Language: de-CH, en-GB
View all headers

On 07.07.24 01:28, Mickey D wrote:
> RockYou2024 leak of 10 billion passwords - the biggest password leak ever
> https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
> https://mashable.com/article/rockyou2024-leaked-password-database

This is a non-event. Just a compilation of passwords from breaches in
the past.

--
"Mille viae ducunt hominem per saecula Romam." (Alanus ab Insulis 1120-1202)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Nick Cine
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Date: Wed, 10 Jul 2024 13:58 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: nickcine@is.invalid (Nick Cine)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Wed, 10 Jul 2024 07:58:07 -0600
Message-ID: <v6m41f$dvu5$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <v6ljqr$1rgur$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 13:58:07 -0000 (UTC)
Injection-Info: solani.org;
logging-data="458693"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:OW/2HnHh3wfkDl5Oc/xkpUrBFJM=
X-User-ID: eJwFwQcBADAIAzBL4xSKHHbwL2EJLCROeiAcg9mpsKqjux+ks0rRK/WWrRzyjRhZrnmFvPwK2RA1
View all headers

On Wed, 10 Jul 2024 11:21:31 +0200, J�rg Lorenz wrote:

> This is a non-event.

Nobody needs your opinion, Arlen.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: badgolferman
Newsgroups: misc.phone.mobile.iphone, comp.mobile.android, comp.sys.mac.system
Date: Wed, 10 Jul 2024 14:11 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: REMOVETHISbadgolferman@gmail.com (badgolferman)
Newsgroups: misc.phone.mobile.iphone,comp.mobile.android,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Wed, 10 Jul 2024 14:11:10 -0000 (UTC)
Message-ID: <v6m4pu$ev6t$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me>
<v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 14:11:10 -0000 (UTC)
Injection-Info: solani.org;
logging-data="490717"; mail-complaints-to="abuse@news.solani.org"
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:yND8L4EtZ1u2bju7gLWpabtvZ8g= sha1:xw/BLwpf/bzr4TsgqgIFLbjeaI4=
X-User-ID: eJwNyMERACEIA8CWMMSg5Ygc/Zdwzv52uoZuUFOc/aS3GNkwZELWx0HUfX3lNrCirAqw9fpzLzu9e3BtHvAHRewU5g==
View all headers

Nick Cine <nickcine@is.invalid> wrote:
> On Wed, 10 Jul 2024 11:21:31 +0200, Jörg Lorenz wrote:
>
>> This is a non-event.
>
> Nobody needs your opinion, Arlen.
>

This is the ultimate insult to Lorenz! Well played!

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 14:39 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 16:39:22 +0200
Organization: Camembert Normand au Lait Cru
Lines: 37
Message-ID: <v6m6eq$1uorr$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 16:39:23 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ce7e26df488cc80cfd20f1f5ab8c7068";
logging-data="2057083"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+CrmZk/M14qJUc+SP2rJP1ThJrPuNT0bQ="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:DvSrm3OOwFZpjpq5+fHRUke0Phc=
Content-Language: de-CH, en-GB
In-Reply-To: <v6m41f$dvu5$1@solani.org>
View all headers

On 10.07.24 15:58, Nick Cine wrote:
> On Wed, 10 Jul 2024 11:21:31 +0200, J�rg Lorenz wrote:
>
>> This is a non-event.
>
> Nobody needs your opinion, Arlen.

Your post shows that you are a bloody beginner in the Usenet, Arlen.

Path:
eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: Nick Cine <nickcine@is.invalid>
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Wed, 10 Jul 2024 07:58:07 -0600
Message-ID: <v6m41f$dvu5$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 13:58:07 -0000 (UTC)
Injection-Info: solani.org;
logging-data="458693"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:OW/2HnHh3wfkDl5Oc/xkpUrBFJM=
X-User-ID:
eJwFwQcBADAIAzBL4xSKHHbwL2EJLCROeiAcg9mpsKqjux+ks0rRK/WWrRzyjRhZrnmFvPwK2RA1
Xref: news.eternal-september.org comp.mobile.android:116605
misc.phone.mobile.iphone:189016 comp.sys.mac.system:196133

And in particular you do not understand what this crap "RockYou2024
leak" is.

--
"Alea iacta est." (Julius Caesar)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: misc.phone.mobile.iphone, comp.mobile.android, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 14:40 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: misc.phone.mobile.iphone,comp.mobile.android,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 16:40:25 +0200
Organization: Camembert Normand au Lait Cru
Lines: 16
Message-ID: <v6m6gp$1uorr$2@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
<v6m4pu$ev6t$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 16:40:26 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ce7e26df488cc80cfd20f1f5ab8c7068";
logging-data="2057083"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18FxyZz7BlGfxAWj5Nm+rKKgxlaohvH1cg="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:EYgfEcffAftRLzk4EuGRnHI52mU=
Content-Language: de-CH, en-GB
In-Reply-To: <v6m4pu$ev6t$1@solani.org>
View all headers

On 10.07.24 16:11, badgolferman wrote:
> Nick Cine <nickcine@is.invalid> wrote:
>> On Wed, 10 Jul 2024 11:21:31 +0200, Jörg Lorenz wrote:
>>
>>> This is a non-event.
>>
>> Nobody needs your opinion, Arlen.
>>
>
> This is the ultimate insult to Lorenz! Well played!

My goodness! You are getting really senile, man.

--
"Alea iacta est." (Julius Caesar)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Nick Cine
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Date: Wed, 10 Jul 2024 18:25 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: nickcine@is.invalid (Nick Cine)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Wed, 10 Jul 2024 12:25:52 -0600
Message-ID: <v6mjnf$e8se$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org> <v6m6eq$1uorr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 18:25:52 -0000 (UTC)
Injection-Info: solani.org;
logging-data="467854"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:+J8wv805lFbFXuEfGUJ4XKtp0HU=
X-User-ID: eJwFwYkBgDAIA8CVREhix6E8+4/gHZzGUhAMLLbSZ5r8rkvOY0/nEea1FSE3TJapxAze9h8aRxDd
View all headers

On Wed, 10 Jul 2024 16:39:22 +0200, J�rg Lorenz wrote:

> Your post shows that you are a bloody beginner in the Usenet.

Shut up Arlen. Say something useful for once, you fucking moron.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Wed, 10 Jul 2024 23:23 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad> <v6g69o$po0q$1@dont-email.me>
<eF9jO.37835$%gXc.3496@fx14.iad> <v6kdlq$1iard$1@dont-email.me>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6kdlq$1iard$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 63
Message-ID: <xJEjO.4400$j7C1.853@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Wed, 10 Jul 2024 23:23:09 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Wed, 10 Jul 2024 19:23:09 -0400
X-Received-Bytes: 3521
View all headers

On 2024-07-09 18:30, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-08 03:59, Chris wrote:
>>> Alan Browne <bitbucket@blackhole.com> wrote:
>>>> On 2024-07-07 17:39, Chris wrote:
>>>>> Alan Browne <bitbucket@blackhole.com> wrote:
>>
>>>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>>>> information are concerned. Or at least TFA.
>>>>>
>>>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>>>> for. ------ [BBB] --------
>>>>>
>>>>> It would certainly crystallise minds if companies risked fines of 10% of
>>>>> global turnover.
>>>>
>>>> I don't disagree with what you wish, but it will have 0 effect on people
>>>> with bad security practices
>>>
>>> I disagree. It will help proactively protect them from themselves. Unlike
>>> the current system in the US where the only response is reactively via law
>>> suits years after people's lives have been affected.
>>
>> You're talking about "personal privacy laws" which is not directly
>> related to computer security.
>
> We're talking about data protection - I miswrote when I said personal
> privacy - laws. Which for personal digital data requires appropriate
> computer security on the side of the data organisation.

Which is widely practiced by most corps. and not by some.

>> One is policy implementation the other is
>> security implementation.
>
> They're part of the same process.

Not at all. Security is defensive to principally protect the assets and
operations of the company (customer info being assets too);
privacy is many things, but unfortunately it's a commodity to profit
from unless there are laws to contain it.

>
>>>> and 0 effect on criminals attempting to
>>>> break into systems.
>>>
>>> Again, disagree. If an org is forced to comply with stricter regulations
>>> regarding data security then that will automatically reduce the target
>>> surface.
>>
>> Now you changed gears (was: [AAA] "personal privacy").
>
> I didn't mention AAA. I mentioned EU and by implication, GDPR.

[AAA] was a label I added to the text to point to your "personal privacy
laws" mention. Look higher in the thread - it's still there.
Here - I've add BBB to it (above about 10 lines from top).

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Fri, 12 Jul 2024 07:22 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Fri, 12 Jul 2024 09:22:16 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <v6qlj7$hi9s$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 12 Jul 2024 07:22:16 -0000 (UTC)
Injection-Info: solani.org;
logging-data="575804"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:rUcPG5zudpiMK1LkdJqH4Umz+5U=
X-User-ID: eJwFwQkBwDAIA0BLbfjlLAz8S+idiV/vUDdXW1sSxzYufvmmg8WeKl0WRhpZ6xYZYKrzDB4q9xFD
In-Reply-To: <v6m41f$dvu5$1@solani.org>
Content-Language: de-CH, en-GB
View all headers

On 10.07.24 15:58, Nick Cine wrote:
> Nobody needs your opinion, Arlen.

Arlen. You are a primitive and brain dead Troll.

--
"De gustibus non est disputandum."

1

rocksolid light 0.9.8
clearnet tor