Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

BOFH excuse #100: IRQ dropout


comp / comp.sys.mac.system / Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever

SubjectAuthor
* RockYou2024 leak of 10 billion passwords - the biggest password leak everMickey D
+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everGordinator
||+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everBill Powell
|||`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
||`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|`* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
| `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|  +- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAndrew
|  `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
|   `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
|    `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everChris
|     `- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
+* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
|`* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everNick Cine
| +* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everbadgolferman
| |`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
| +* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
| |`- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everNick Cine
| `- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJörg Lorenz
`* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everFishrrman
 +- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJolly Roger
 `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
  `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJolly Roger
   `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
    `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJolly Roger
     `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
      `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everJolly Roger
       `* Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne
        `- Re: RockYou2024 leak of 10 billion passwords - the biggest password leak everAlan Browne

Pages:12
Subject: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Mickey D
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Sat, 6 Jul 2024 23:28 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!newsfeed.endofthelinebbs.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: mickeydavis078XX@ptd.net (Mickey D)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Sat, 6 Jul 2024 19:28:12 -0400
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 6 Jul 2024 23:28:13 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="62240"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: MT-NewsWatcher/3.5.3b3 (Intel Mac OS X)
Cancel-Lock: sha1:6E9l84FbBeluJEvfCL3pl6oXtKQ= sha256:49yLb45O4rFbc0auqGVlKKTOVHhp5mv2a1fY5ceFS5U=
sha1:jI8iZMnbUal/MlR/n5fPZjmXOQ8= sha256:jD+dvJayiGCoQSgGGa0dGY2hJALzMgL+0I2ciQSfuwA=
View all headers

RockYou2024 leak of 10 billion passwords - the biggest password leak ever
https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
https://mashable.com/article/rockyou2024-leaked-password-database

Cybernews researchers discovered what appears to be the largest password
compilation with a staggering 9,948,575,739 unique plaintext passwords. The
file with the data, titled rockyou2024.txt, was posted on July 4th by forum
user ObamaCare.

While the user registered in late May 2024, they have previously shared an
employee database from the law firm Simmons & Simmons, a lead from an
online casino AskGamblers, and student applications for Rowan College at
Burlington County.

The team cross-referenced the passwords included in the RockYou2024 leak
with data from Cybernews' Leaked Password Checker, which revealed that
these passwords came from a mix of old and new data breaches.

"In its essence, the RockYou2024 leak is a compilation of real-world
passwords used by individuals all over the world. Revealing that many
passwords for threat actors substantially heightens the risk of credential
stuffing attacks," researchers said.

Credential stuffing attacks can be severely damaging for users and
businesses. For example, a recent wave of attacks targeting Santander,
Ticketmaster, Advance Auto Parts, QuoteWizard, and others was a direct
result of credential stuffing attacks against the victims' cloud service
provider, Snowflake.

"Threat actors could exploit the RockYou2024 password compilation to
conduct brute-force attacks and gain unauthorized access to various online
accounts used by individuals who employ passwords included in the dataset,"
the team explained.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 11:26 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!newsfeed.bofh.team!nntp.comgw.net!peer01.ams4!peer.am4.highwinds-media.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx12.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 29
Message-ID: <FXuiO.11411$6eV2.2097@fx12.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 11:26:29 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 07:26:29 -0400
X-Received-Bytes: 1865
View all headers

On 2024-07-06 19:28, Mickey D wrote:
>
> "Threat actors could exploit the RockYou2024 password compilation to
> conduct brute-force attacks and gain unauthorized access to various online
> accounts used by individuals who employ passwords included in the dataset,"
> the team explained.

Why Passkeys should be used wherever financial transactions or sensitive
information are concerned. Or at least TFA.

And passwords need to be strong - computer generated is always best.

Otherwise password access should have time outs.

1st time wrong: no delay
2nd time wrong: 1 s delay
3rt time wrong: 2 s delay
4th time wrong: 4 s
5 8 s

10 4 hour delay, then reset to 0 delay.

Brute force login attacks would simply not work.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Gordinator
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: usenet-news.net
Date: Sun, 7 Jul 2024 17:27 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!peer01.ams4!peer.am4.highwinds-media.com!news.highwinds-media.com!fx06.ams4.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
Content-Language: en-US
From: gordinator@gordinator.org (Gordinator)
In-Reply-To: <FXuiO.11411$6eV2.2097@fx12.iad>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 45
Message-ID: <WdAiO.48082$CGs.37472@fx06.ams4>
X-Complaints-To: abuse@usenet-news.net
NNTP-Posting-Date: Sun, 07 Jul 2024 17:27:18 UTC
Organization: usenet-news.net
Date: Sun, 7 Jul 2024 18:27:18 +0100
X-Received-Bytes: 2702
View all headers

On 07/07/2024 12:26, Alan Browne wrote:
> On 2024-07-06 19:28, Mickey D wrote:
>>
>> "Threat actors could exploit the RockYou2024 password compilation to
>> conduct brute-force attacks and gain unauthorized access to various
>> online
>> accounts used by individuals who employ passwords included in the
>> dataset,"
>> the team explained.
>
> Why Passkeys should be used wherever financial transactions or sensitive
> information are concerned.  Or at least TFA.
>
> And passwords need to be strong - computer generated is always best.
>
> Otherwise password access should have time outs.
>
> 1st time wrong: no delay
> 2nd time wrong: 1 s delay
> 3rt time wrong: 2 s delay
> 4th time wrong: 4 s
> 5               8 s
>
> 10              4 hour delay, then reset to 0 delay.
>
> Brute force login attacks would simply not work.
>

A better solution would be to use a hashing algorithm like Argon2 that
is designed to be resistant to such attacks. That way, if you get
offline access to a database somehow - which is how these passwords were
derived - cracking takes a stupid amount of time.

Such modern algorithms use things like salting by default as well, which
eliminates rainbow table attacks (pre-computed lists of hashes and their
passwords), meaning you need to perform the slow and expensive
brute-force method.

Also, a timeout would only help with online logins. Offline ones are the
real deal, because you can go ham with no consequence.

That said, your idea of using computer-generated passwords is great. I
use 64-character random passwords generated by KeePassXC. It works
great, except for the websites that want shorter passwords, for some
bizarre reason.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Bill Powell
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: Hispagatos.org
Date: Sun, 7 Jul 2024 19:03 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.hispagatos.org!.POSTED!not-for-mail
From: bill@anarchists.org (Bill Powell)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Sun, 7 Jul 2024 21:03:00 +0200
Organization: Hispagatos.org
Message-ID: <v6eop3$1e9q0$1@matrix.hispagatos.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 7 Jul 2024 19:02:59 -0000 (UTC)
Injection-Info: matrix.hispagatos.org;
logging-data="1517376"; mail-complaints-to="abuse@hispagatos.org"
User-Agent: XanaNews/1.19.1.372 (x86; Portable ISpell)
View all headers

On Sun, 7 Jul 2024 18:27:18 +0100, Gordinator wrote:

> A better solution would be to use a hashing algorithm like Argon2 that
> is designed to be resistant to such attacks.

Can someone who knows let me know WHAT was published online?

Is it people's login and passwords?
Or just a long list of people's passwords?

If it's just a long list of passwords, what good is that?
A dictionary like lookup would work as well, wouldn't it?

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 21:27 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
<v6eop3$1e9q0$1@matrix.hispagatos.org>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6eop3$1e9q0$1@matrix.hispagatos.org>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 24
Message-ID: <%KDiO.1909$qFQd.1795@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 21:27:23 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 17:27:23 -0400
X-Received-Bytes: 1822
View all headers

On 2024-07-07 15:03, Bill Powell wrote:

> Can someone who knows let me know WHAT was published online?
>
> Is it people's login and passwords?
> Or just a long list of people's passwords?
>
> If it's just a long list of passwords, what good is that?
> A dictionary like lookup would work as well, wouldn't it?

It's just a list of passwords.

Depends on what you mean by "dictionary" as the password list won't have
things that are in any given dictionary (no matter what the kind).

It is usable to verify that your password is not "in there". I wrote a
quick program to do just that - but my passwords are too ridiculous -
never mind anyone figuring the login name and where it's being used.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 21:30 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!tncsrv06.tnetconsulting.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <WdAiO.48082$CGs.37472@fx06.ams4>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <WdAiO.48082$CGs.37472@fx06.ams4>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 66
Message-ID: <BNDiO.1910$qFQd.566@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 21:30:09 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 17:30:09 -0400
X-Received-Bytes: 3479
View all headers

On 2024-07-07 13:27, Gordinator wrote:
> On 07/07/2024 12:26, Alan Browne wrote:
>> On 2024-07-06 19:28, Mickey D wrote:
>>>
>>> "Threat actors could exploit the RockYou2024 password compilation to
>>> conduct brute-force attacks and gain unauthorized access to various
>>> online
>>> accounts used by individuals who employ passwords included in the
>>> dataset,"
>>> the team explained.
>>
>> Why Passkeys should be used wherever financial transactions or
>> sensitive information are concerned.  Or at least TFA.
>>
>> And passwords need to be strong - computer generated is always best.
>>
>> Otherwise password access should have time outs.
>>
>> 1st time wrong: no delay
>> 2nd time wrong: 1 s delay
>> 3rt time wrong: 2 s delay
>> 4th time wrong: 4 s
>> 5               8 s
>>
>> 10              4 hour delay, then reset to 0 delay.
>>
>> Brute force login attacks would simply not work.
>>
>
> A better solution would be to use a hashing algorithm like Argon2 that
> is designed to be resistant to such attacks. That way, if you get
> offline access to a database somehow - which is how these passwords were
> derived - cracking takes a stupid amount of time.

Having such a list won't help against such.

> Such modern algorithms use things like salting by default as well, which
> eliminates rainbow table attacks (pre-computed lists of hashes and their
> passwords), meaning you need to perform the slow and expensive
> brute-force method.

Indeed, but the issue is the brute force from the outside. (Which also
needs a target site and account name ... already getting very unlikely).

>
> Also, a timeout would only help with online logins. Offline ones are the
> real deal, because you can go ham with no consequence.

That implies they've copied an entire system and are going after info in
it. Since the pw database is (as you mention salted an encrypted) such
an attack will go exactly nowhere with the passwords in the list - esp.
when the salt is derived from other customer data.

> That said, your idea of using computer-generated passwords is great. I
> use 64-character random passwords generated by KeePassXC. It works
> great, except for the websites that want shorter passwords, for some
> bizarre reason.

64 char is overkill. 20 char is much more than sufficient assuming it's
random.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Sun, 7 Jul 2024 21:39 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Sun, 7 Jul 2024 21:39:15 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 17
Message-ID: <v6f1u3$gh46$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 07 Jul 2024 23:39:15 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="b634725a5483ddce92b67cd331d52ac8";
logging-data="541830"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+1411v2e1Te2b7Kl0VPGyi3XNz7psKQkM="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:6bqfXxcwaHjnTixMVP0Vj0aXT/w=
sha1:uIiZ1/SS1gkWnSBMK6Qi++qz1mk=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-06 19:28, Mickey D wrote:
>>
>> "Threat actors could exploit the RockYou2024 password compilation to
>> conduct brute-force attacks and gain unauthorized access to various online
>> accounts used by individuals who employ passwords included in the dataset,"
>> the team explained.
>
> Why Passkeys should be used wherever financial transactions or sensitive
> information are concerned. Or at least TFA.

Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
for.

It would certainly crystallise minds if companies risked fines of 10% of
global turnover.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 22:40 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.chmurka.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx13.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6f1u3$gh46$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 30
Message-ID: <SPEiO.13229$3zB6.6414@fx13.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Sun, 07 Jul 2024 22:40:50 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Sun, 7 Jul 2024 18:40:50 -0400
X-Received-Bytes: 2052
View all headers

On 2024-07-07 17:39, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-06 19:28, Mickey D wrote:
>>>
>>> "Threat actors could exploit the RockYou2024 password compilation to
>>> conduct brute-force attacks and gain unauthorized access to various online
>>> accounts used by individuals who employ passwords included in the dataset,"
>>> the team explained.
>>
>> Why Passkeys should be used wherever financial transactions or sensitive
>> information are concerned. Or at least TFA.
>
> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
> for.
>
> It would certainly crystallise minds if companies risked fines of 10% of
> global turnover.

I don't disagree with what you wish, but it will have 0 effect on people
with bad security practices and 0 effect on criminals attempting to
break into systems.

The internet grew up from nothing to everywhere all at once and the
security implications lagged that by near 20 years.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Andrew
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Mon, 8 Jul 2024 02:18 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!border-1.nntp.ord.giganews.com!border-2.nntp.ord.giganews.com!nntp.giganews.com!news-out.netnews.com!s1-3.netnews.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrew@spam.net (Andrew)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Mon, 8 Jul 2024 02:18:26 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <v6fi9h$nle$1@nnrp.usenet.blueworldhosting.com>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me> <SPEiO.13229$3zB6.6414@fx13.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 8 Jul 2024 02:18:26 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="24238"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: NewsTap/5.5 (iPad)
Cancel-Lock: sha1:ksEQYri7/rPw2h92CixI1SEVEH0= sha256:FG8wQvLFYnJRhXKvmGsGFDEy98axkn7QatPftDoh/3Y=
sha1:giD3mDkmBG0f7K/xpxtZCfr3nlE= sha256:Q4JciwOh30ozyfTiouEeYbpDU4IoNDy+QtFPo+Pf2B4=
X-Face: VQ}*Ueh[4uTOa]Md([|$jb%rw~ksq}bzqA;z-.*8JM`4+zL[`N\ORHCI80}]}$]$e5]/i#v qdYsE`yh@ZL3L{H:So{yN)b=AZJtpaP98ch_4W}
X-Received-Bytes: 2601
Lines: 29
View all headers

Alan Browne wrote on Sun, 7 Jul 2024 18:40:50 -0400 :

> it will have 0 effect on people with bad security practices

The problem is lots of people have no good way to remember passwords.

What I do, for example, is:
1. I store passwords in a cross-platform encrypted desktop manager
(KeepassXC)

2. I sync the kdbx database periodically keeping the master on the PC.
Note that my passwords almost never are changed on a mobile device.

3. Every platform has a free program to read that kdbx file, I think.
For example, Windows, Linux & macOS can use the KeepassXC passwd mgr.
<https://keepassxc.org/download/>

Android uses, for example, Keepass2Android, but others exist.
<https://play.google.com/store/apps/details?id=keepass2android.keepass2android>

iOS uses KeePassium for example, but others also likely exist.
<https://apps.apple.com/us/app/keepassium-keepass-passwords/id1435127111>

Each time I'm forced to create a login/passwd combination, I type "vipw"
which, on Windows, has for decades, brought up the native password manager.

Each time I need a login/password, I also type "vipw" into Windows, and up
comes that same password manager, with the sort order usually set to LIFO.

But how many people do that?

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Mon, 8 Jul 2024 07:59 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Mon, 8 Jul 2024 07:59:52 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 41
Message-ID: <v6g69o$po0q$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
<v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Mon, 08 Jul 2024 09:59:52 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="effaeb9d21dbd0aea9666f8d88857116";
logging-data="843802"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX183SrXz8erYnynez3HdGUMQ0b1FJ1WymD8="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:W3CmfWHopS0V7Mw6KP33OL1HfiM=
sha1:J9u6asDWUayUDX9gOzi79BtnFCQ=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-07 17:39, Chris wrote:
>> Alan Browne <bitbucket@blackhole.com> wrote:
>>> On 2024-07-06 19:28, Mickey D wrote:
>>>>
>>>> "Threat actors could exploit the RockYou2024 password compilation to
>>>> conduct brute-force attacks and gain unauthorized access to various online
>>>> accounts used by individuals who employ passwords included in the dataset,"
>>>> the team explained.
>>>
>>> Why Passkeys should be used wherever financial transactions or sensitive
>>> information are concerned. Or at least TFA.
>>
>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU
>> for.
>>
>> It would certainly crystallise minds if companies risked fines of 10% of
>> global turnover.
>
> I don't disagree with what you wish, but it will have 0 effect on people
> with bad security practices

I disagree. It will help proactively protect them from themselves. Unlike
the current system in the US where the only response is reactively via law
suits years after people's lives have been affected.

> and 0 effect on criminals attempting to
> break into systems.

Again, disagree. If an org is forced to comply with stricter regulations
regarding data security then that will automatically reduce the target
surface.

However, criminals can be very smart and will change tactics.

> The internet grew up from nothing to everywhere all at once and the
> security implications lagged that by near 20 years.

Which is why we're now seeing more social engineering attacks nowadays that
technical attacks. I'm far less worried about malware today than I used to
be.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Tue, 9 Jul 2024 12:02 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!2.eu.feeder.erje.net!feeder.erje.net!feeder1-2.proxad.net!proxad.net!feeder1-1.proxad.net!193.141.40.65.MISMATCH!npeer.as286.net!npeer-ng0.as286.net!peer01.ams1!peer.ams1.xlned.com!news.xlned.com!peer01.ams4!peer.am4.highwinds-media.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx14.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad> <v6g69o$po0q$1@dont-email.me>
Content-Language: en-US
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6g69o$po0q$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 59
Message-ID: <eF9jO.37835$%gXc.3496@fx14.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Tue, 09 Jul 2024 12:02:18 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Tue, 9 Jul 2024 08:02:18 -0400
X-Received-Bytes: 3272
View all headers

On 2024-07-08 03:59, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-07 17:39, Chris wrote:
>>> Alan Browne <bitbucket@blackhole.com> wrote:

>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>> information are concerned. Or at least TFA.
>>>
>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>> for.
>>>
>>> It would certainly crystallise minds if companies risked fines of 10% of
>>> global turnover.
>>
>> I don't disagree with what you wish, but it will have 0 effect on people
>> with bad security practices
>
> I disagree. It will help proactively protect them from themselves. Unlike
> the current system in the US where the only response is reactively via law
> suits years after people's lives have been affected.

You're talking about "personal privacy laws" which is not directly
related to computer security. One is policy implementation the other is
security implementation.

>> and 0 effect on criminals attempting to
>> break into systems.
>
> Again, disagree. If an org is forced to comply with stricter regulations
> regarding data security then that will automatically reduce the target
> surface.

Now you changed gears (was: [AAA] "personal privacy").

>
> However, criminals can be very smart and will change tactics.

The most successful side is phishing in one form or another - and that
will never stop.

Still - poking around for system security weaknesses will never stop.

Main things server side is _at least_ TFA and better: Passkeys.

>> The internet grew up from nothing to everywhere all at once and the
>> security implications lagged that by near 20 years.
>
> Which is why we're now seeing more social engineering attacks nowadays that
> technical attacks. I'm far less worried about malware today than I used to
> be.

Yet, they hackers keep hacking. And don't forget that any new website
implementation might be especially weak.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Chris
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: A noiseless patient Spider
Date: Tue, 9 Jul 2024 22:30 UTC
References: 1 2 3 4 5 6
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: ithinkiam@gmail.com (Chris)
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Tue, 9 Jul 2024 22:30:18 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 45
Message-ID: <v6kdlq$1iard$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad>
<v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad>
<v6g69o$po0q$1@dont-email.me>
<eF9jO.37835$%gXc.3496@fx14.iad>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 00:30:22 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="89b34a3dd57c95a3b97f4789ffa5e6c2";
logging-data="1649517"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18C2pQb0Ul+DP5DTxvbYT6yj7uzXbPNqcY="
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:K+81WxCANLZjnzguoFpT/1aBI7U=
sha1:ioJgkm8V1cjrfl3SBt3Z4m/FEU8=
View all headers

Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-08 03:59, Chris wrote:
>> Alan Browne <bitbucket@blackhole.com> wrote:
>>> On 2024-07-07 17:39, Chris wrote:
>>>> Alan Browne <bitbucket@blackhole.com> wrote:
>
>>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>>> information are concerned. Or at least TFA.
>>>>
>>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>>> for.
>>>>
>>>> It would certainly crystallise minds if companies risked fines of 10% of
>>>> global turnover.
>>>
>>> I don't disagree with what you wish, but it will have 0 effect on people
>>> with bad security practices
>>
>> I disagree. It will help proactively protect them from themselves. Unlike
>> the current system in the US where the only response is reactively via law
>> suits years after people's lives have been affected.
>
> You're talking about "personal privacy laws" which is not directly
> related to computer security.

We're talking about data protection - I miswrote when I said personal
privacy - laws. Which for personal digital data requires appropriate
computer security on the side of the data organisation.

> One is policy implementation the other is
> security implementation.

They're part of the same process.

>>> and 0 effect on criminals attempting to
>>> break into systems.
>>
>> Again, disagree. If an org is forced to comply with stricter regulations
>> regarding data security then that will automatically reduce the target
>> surface.
>
> Now you changed gears (was: [AAA] "personal privacy").

I didn't mention AAA. I mentioned EU and by implication, GDPR.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: alt.comp.os.windows-10, comp.mobile.android, misc.phone.mobile.iphone, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 09:21 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: alt.comp.os.windows-10,comp.mobile.android,misc.phone.mobile.iphone,alt.os.linux,comp.sys.mac.system,alt.privacy
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 11:21:31 +0200
Organization: Camembert Normand au Lait Cru
Lines: 11
Message-ID: <v6ljqr$1rgur$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 10 Jul 2024 11:21:31 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="f608d4327c4234673cbba005bd9990d0";
logging-data="1950683"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19o2qNQBgEFyZm/9sOuX6s9fMRHW4WU2/E="
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:115.0) Gecko/20100101
Thunderbird/115.12.2
Cancel-Lock: sha1:9UxN0N4twD69rrPYVGIdmz4op5g=
In-Reply-To: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
Content-Language: de-CH, en-GB
View all headers

On 07.07.24 01:28, Mickey D wrote:
> RockYou2024 leak of 10 billion passwords - the biggest password leak ever
> https://cybernews.com/security/rockyou2024-largest-password-compilation-leak/
> https://mashable.com/article/rockyou2024-leaked-password-database

This is a non-event. Just a compilation of passwords from breaches in
the past.

--
"Mille viae ducunt hominem per saecula Romam." (Alanus ab Insulis 1120-1202)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Nick Cine
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Date: Wed, 10 Jul 2024 13:58 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: nickcine@is.invalid (Nick Cine)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Wed, 10 Jul 2024 07:58:07 -0600
Message-ID: <v6m41f$dvu5$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <v6ljqr$1rgur$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 13:58:07 -0000 (UTC)
Injection-Info: solani.org;
logging-data="458693"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:OW/2HnHh3wfkDl5Oc/xkpUrBFJM=
X-User-ID: eJwFwQcBADAIAzBL4xSKHHbwL2EJLCROeiAcg9mpsKqjux+ks0rRK/WWrRzyjRhZrnmFvPwK2RA1
View all headers

On Wed, 10 Jul 2024 11:21:31 +0200, J�rg Lorenz wrote:

> This is a non-event.

Nobody needs your opinion, Arlen.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: badgolferman
Newsgroups: misc.phone.mobile.iphone, comp.mobile.android, comp.sys.mac.system
Date: Wed, 10 Jul 2024 14:11 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: REMOVETHISbadgolferman@gmail.com (badgolferman)
Newsgroups: misc.phone.mobile.iphone,comp.mobile.android,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Wed, 10 Jul 2024 14:11:10 -0000 (UTC)
Message-ID: <v6m4pu$ev6t$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me>
<v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 14:11:10 -0000 (UTC)
Injection-Info: solani.org;
logging-data="490717"; mail-complaints-to="abuse@news.solani.org"
User-Agent: NewsTap/5.5 (iPhone/iPod Touch)
Cancel-Lock: sha1:yND8L4EtZ1u2bju7gLWpabtvZ8g= sha1:xw/BLwpf/bzr4TsgqgIFLbjeaI4=
X-User-ID: eJwNyMERACEIA8CWMMSg5Ygc/Zdwzv52uoZuUFOc/aS3GNkwZELWx0HUfX3lNrCirAqw9fpzLzu9e3BtHvAHRewU5g==
View all headers

Nick Cine <nickcine@is.invalid> wrote:
> On Wed, 10 Jul 2024 11:21:31 +0200, Jörg Lorenz wrote:
>
>> This is a non-event.
>
> Nobody needs your opinion, Arlen.
>

This is the ultimate insult to Lorenz! Well played!

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 14:39 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 16:39:22 +0200
Organization: Camembert Normand au Lait Cru
Lines: 37
Message-ID: <v6m6eq$1uorr$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 16:39:23 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ce7e26df488cc80cfd20f1f5ab8c7068";
logging-data="2057083"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+CrmZk/M14qJUc+SP2rJP1ThJrPuNT0bQ="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:DvSrm3OOwFZpjpq5+fHRUke0Phc=
Content-Language: de-CH, en-GB
In-Reply-To: <v6m41f$dvu5$1@solani.org>
View all headers

On 10.07.24 15:58, Nick Cine wrote:
> On Wed, 10 Jul 2024 11:21:31 +0200, J�rg Lorenz wrote:
>
>> This is a non-event.
>
> Nobody needs your opinion, Arlen.

Your post shows that you are a bloody beginner in the Usenet, Arlen.

Path:
eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: Nick Cine <nickcine@is.invalid>
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest
password leak ever
Date: Wed, 10 Jul 2024 07:58:07 -0600
Message-ID: <v6m41f$dvu5$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 13:58:07 -0000 (UTC)
Injection-Info: solani.org;
logging-data="458693"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:OW/2HnHh3wfkDl5Oc/xkpUrBFJM=
X-User-ID:
eJwFwQcBADAIAzBL4xSKHHbwL2EJLCROeiAcg9mpsKqjux+ks0rRK/WWrRzyjRhZrnmFvPwK2RA1
Xref: news.eternal-september.org comp.mobile.android:116605
misc.phone.mobile.iphone:189016 comp.sys.mac.system:196133

And in particular you do not understand what this crap "RockYou2024
leak" is.

--
"Alea iacta est." (Julius Caesar)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: misc.phone.mobile.iphone, comp.mobile.android, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Wed, 10 Jul 2024 14:40 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: misc.phone.mobile.iphone,comp.mobile.android,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Wed, 10 Jul 2024 16:40:25 +0200
Organization: Camembert Normand au Lait Cru
Lines: 16
Message-ID: <v6m6gp$1uorr$2@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
<v6m4pu$ev6t$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 16:40:26 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="ce7e26df488cc80cfd20f1f5ab8c7068";
logging-data="2057083"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18FxyZz7BlGfxAWj5Nm+rKKgxlaohvH1cg="
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:EYgfEcffAftRLzk4EuGRnHI52mU=
Content-Language: de-CH, en-GB
In-Reply-To: <v6m4pu$ev6t$1@solani.org>
View all headers

On 10.07.24 16:11, badgolferman wrote:
> Nick Cine <nickcine@is.invalid> wrote:
>> On Wed, 10 Jul 2024 11:21:31 +0200, Jörg Lorenz wrote:
>>
>>> This is a non-event.
>>
>> Nobody needs your opinion, Arlen.
>>
>
> This is the ultimate insult to Lorenz! Well played!

My goodness! You are getting really senile, man.

--
"Alea iacta est." (Julius Caesar)

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Nick Cine
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Date: Wed, 10 Jul 2024 18:25 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: nickcine@is.invalid (Nick Cine)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
Date: Wed, 10 Jul 2024 12:25:52 -0600
Message-ID: <v6mjnf$e8se$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com> <v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org> <v6m6eq$1uorr$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=fixed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 10 Jul 2024 18:25:52 -0000 (UTC)
Injection-Info: solani.org;
logging-data="467854"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Usenapp/0.93/l for MacOS - Full License
Cancel-Lock: sha1:+J8wv805lFbFXuEfGUJ4XKtp0HU=
X-User-ID: eJwFwYkBgDAIA8CVREhix6E8+4/gHZzGUhAMLLbSZ5r8rkvOY0/nEea1FSE3TJapxAze9h8aRxDd
View all headers

On Wed, 10 Jul 2024 16:39:22 +0200, J�rg Lorenz wrote:

> Your post shows that you are a bloody beginner in the Usenet.

Shut up Arlen. Say something useful for once, you fucking moron.

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: misc.phone.mobile.iphone, alt.comp.os.windows-10, comp.mobile.android, alt.os.linux, comp.sys.mac.system, alt.privacy
Organization: UsenetServer - www.usenetserver.com
Date: Wed, 10 Jul 2024 23:23 UTC
References: 1 2 3 4 5 6 7
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer03.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx03.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: misc.phone.mobile.iphone,alt.comp.os.windows-10,comp.mobile.android,alt.os.linux,comp.sys.mac.system,alt.privacy
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<FXuiO.11411$6eV2.2097@fx12.iad> <v6f1u3$gh46$1@dont-email.me>
<SPEiO.13229$3zB6.6414@fx13.iad> <v6g69o$po0q$1@dont-email.me>
<eF9jO.37835$%gXc.3496@fx14.iad> <v6kdlq$1iard$1@dont-email.me>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6kdlq$1iard$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 63
Message-ID: <xJEjO.4400$j7C1.853@fx03.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Wed, 10 Jul 2024 23:23:09 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Wed, 10 Jul 2024 19:23:09 -0400
X-Received-Bytes: 3521
View all headers

On 2024-07-09 18:30, Chris wrote:
> Alan Browne <bitbucket@blackhole.com> wrote:
>> On 2024-07-08 03:59, Chris wrote:
>>> Alan Browne <bitbucket@blackhole.com> wrote:
>>>> On 2024-07-07 17:39, Chris wrote:
>>>>> Alan Browne <bitbucket@blackhole.com> wrote:
>>
>>>>>> Why Passkeys should be used wherever financial transactions or sensitive
>>>>>> information are concerned. Or at least TFA.
>>>>>
>>>>> Or, crazy idea, tighten up personal privacy laws like some ridicule the EU <-- [AAA]
>>>>> for. ------ [BBB] --------
>>>>>
>>>>> It would certainly crystallise minds if companies risked fines of 10% of
>>>>> global turnover.
>>>>
>>>> I don't disagree with what you wish, but it will have 0 effect on people
>>>> with bad security practices
>>>
>>> I disagree. It will help proactively protect them from themselves. Unlike
>>> the current system in the US where the only response is reactively via law
>>> suits years after people's lives have been affected.
>>
>> You're talking about "personal privacy laws" which is not directly
>> related to computer security.
>
> We're talking about data protection - I miswrote when I said personal
> privacy - laws. Which for personal digital data requires appropriate
> computer security on the side of the data organisation.

Which is widely practiced by most corps. and not by some.

>> One is policy implementation the other is
>> security implementation.
>
> They're part of the same process.

Not at all. Security is defensive to principally protect the assets and
operations of the company (customer info being assets too);
privacy is many things, but unfortunately it's a commodity to profit
from unless there are laws to contain it.

>
>>>> and 0 effect on criminals attempting to
>>>> break into systems.
>>>
>>> Again, disagree. If an org is forced to comply with stricter regulations
>>> regarding data security then that will automatically reduce the target
>>> surface.
>>
>> Now you changed gears (was: [AAA] "personal privacy").
>
> I didn't mention AAA. I mentioned EU and by implication, GDPR.

[AAA] was a label I added to the text to point to your "personal privacy
laws" mention. Look higher in the thread - it's still there.
Here - I've add BBB to it (above about 10 lines from top).

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Fishrrman
Newsgroups: comp.sys.mac.system
Organization: A noiseless patient Spider
Date: Thu, 11 Jul 2024 20:17 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Fishrrman2000@yahoo.com (Fishrrman)
Newsgroups: comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Thu, 11 Jul 2024 16:17:03 -0400
Organization: A noiseless patient Spider
Lines: 29
Message-ID: <v6pek0$2k746$1@dont-email.me>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Thu, 11 Jul 2024 22:17:05 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="6435866693fbf9d8242e287d59258af6";
logging-data="2759814"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18zQd1ZAswI2tJ6eUS28M29Yy7csviSkr0="
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:60.0)
Gecko/20100101 Thunderbird/60.9.1
Cancel-Lock: sha1:Ex8wqQyFSodMwdTun2weyKk/MDg=
Content-Language: en-US
In-Reply-To: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
View all headers

On 7/6/24 7:28 PM, Mickey D wrote:
> Cybernews researchers discovered what appears to be the largest password
> compilation with a staggering 9,948,575,739 unique plaintext passwords. The
> file with the data, titled rockyou2024.txt, was posted on July 4th by forum
> user ObamaCare.

I'm currently experimenting with Apple's new OS 15 "Sequoia"
on an external SSD.

One of the new features of this release will be the Apple
"Passwords" app.

Although (up to this point) I've kept all my passwords in a
self-created database, I opened Passwords to see what it was
like.

It had already compiled a list of passwords that I'd been
using on the experimental Sequoia SSD.

But one feature that looked welcome was...
.... it identified two of my passwords that may have recently
been "compromised". It looks like the Passwords app is
reaching into some "resevoir" of "known-compromised"
passwords, or perhaps even Apple has acquired some of these
giant purloined password files.

In any case, it lets you know if specific passwords you're
using may be compromised...

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jolly Roger
Newsgroups: comp.sys.mac.system
Organization: People for the Ethical Treatment of Pirates
Date: Thu, 11 Jul 2024 20:27 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jollyroger@pobox.com (Jolly Roger)
Newsgroups: comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: 11 Jul 2024 20:27:20 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 37
Message-ID: <lfath7Ffv9gU1@mid.individual.net>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6pek0$2k746$1@dont-email.me>
X-Trace: individual.net OEjjnPeYhA6IjQwLoV7rlQcbUb7s60gvq91bL3tx1MPe8Lp8wR
Cancel-Lock: sha1:tGGQmQKlL8wnEzl7Cq0LuNGXRq0= sha256:nlh8ZMjW5yK57+AnPiitUfogJh7hZbqIk2kt1Cop5BE=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
View all headers

On 2024-07-11, Fishrrman <Fishrrman2000@yahoo.com> wrote:
>
> I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
> external SSD.
>
> One of the new features of this release will be the Apple "Passwords"
> app.
>
> Although (up to this point) I've kept all my passwords in a
> self-created database, I opened Passwords to see what it was like.
>
> It had already compiled a list of passwords that I'd been using on the
> experimental Sequoia SSD.

Those are passwords you entered in Safari presumably, which stored them
in the Keychain. In previous releases Keychain passwords were accessible
either in the System Settings > Passwords pane or in the Keychain app,
depending on the macOS release version.

> But one feature that looked welcome was... ... it identified two of
> my passwords that may have recently been "compromised". It looks like
> the Passwords app is reaching into some "resevoir" of
> "known-compromised" passwords, or perhaps even Apple has acquired some
> of these giant purloined password files.
>
> In any case, it lets you know if specific passwords you're using may
> be compromised...

Yes, that's been a Keychain feature for some time now. It even has
buttons that take you to the website in question to change your password
there. It's pretty handy.

--
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: comp.sys.mac.system
Organization: UsenetServer - www.usenetserver.com
Date: Thu, 11 Jul 2024 23:44 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!panix!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx15.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: comp.sys.mac.system
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6pek0$2k746$1@dont-email.me>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <v6pek0$2k746$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 46
Message-ID: <z7_jO.37974$SLqf.16597@fx15.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Thu, 11 Jul 2024 23:44:31 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Thu, 11 Jul 2024 19:44:31 -0400
X-Received-Bytes: 2711
View all headers

On 2024-07-11 16:17, Fishrrman wrote:
> On 7/6/24 7:28 PM, Mickey D wrote:
>> Cybernews researchers discovered what appears to be the largest password
>> compilation with a staggering 9,948,575,739 unique plaintext
>> passwords. The
>> file with the data, titled rockyou2024.txt, was posted on July 4th by
>> forum
>> user ObamaCare.
>
>
> I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
> external SSD.
>
> One of the new features of this release will be the Apple "Passwords" app.
>
> Although (up to this point) I've kept all my passwords in a self-created
> database, I opened Passwords to see what it was like.
>
> It had already compiled a list of passwords that I'd been using on the
> experimental Sequoia SSD.
>
> But one feature that looked welcome was...
> ... it identified two of my passwords that may have recently been
> "compromised". It looks like the Passwords app is reaching into some
> "resevoir" of "known-compromised" passwords, or perhaps even Apple has
> acquired some of these giant purloined password files.
>
> In any case, it lets you know if specific passwords you're using may be
> compromised...

Good thing.

I DL'd an earlier RockYou and exported my passwords from 1Password to a
flatfile (.txt). The obtuse 1Password text file format (clearly
"evolved over time" <cough>) took some time to code for. This program
searched all my passwords against the RockYou file. One showed up. A
complex password that some company generously leaked to the world once
upon a time. While I had changed the password on the site I hadn't
flushed the backup of it from 1P and it was in the 1P file... since
abandoned that co. but a copy of that pw is forever in Rockyou variants.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jolly Roger
Newsgroups: comp.sys.mac.system
Organization: People for the Ethical Treatment of Pirates
Date: Fri, 12 Jul 2024 00:21 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: jollyroger@pobox.com (Jolly Roger)
Newsgroups: comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: 12 Jul 2024 00:21:12 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 50
Message-ID: <lfbb7oFhto3U1@mid.individual.net>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6pek0$2k746$1@dont-email.me> <z7_jO.37974$SLqf.16597@fx15.iad>
X-Trace: individual.net 0tTlehsurhUQoJAmmhMW2Qyer1kRzm+Sa16DFaUKg4xciqS8uH
Cancel-Lock: sha1:/T51IxcxMlnK4sLQctxG9MGQT4k= sha256:VJ036cv/r3kOSzI8Wqrsff5gif9rZUwJlF4LY0DMSuA=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
View all headers

On 2024-07-11, Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-11 16:17, Fishrrman wrote:
>> On 7/6/24 7:28 PM, Mickey D wrote:
>>> Cybernews researchers discovered what appears to be the largest
>>> password compilation with a staggering 9,948,575,739 unique
>>> plaintext passwords. The file with the data, titled rockyou2024.txt,
>>> was posted on July 4th by forum user ObamaCare.
>>
>> I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
>> external SSD.
>>
>> One of the new features of this release will be the Apple "Passwords"
>> app.
>>
>> Although (up to this point) I've kept all my passwords in a
>> self-created database, I opened Passwords to see what it was like.
>>
>> It had already compiled a list of passwords that I'd been using on
>> the experimental Sequoia SSD.
>>
>> But one feature that looked welcome was... ... it identified two of
>> my passwords that may have recently been "compromised". It looks like
>> the Passwords app is reaching into some "resevoir" of
>> "known-compromised" passwords, or perhaps even Apple has acquired
>> some of these giant purloined password files.
>>
>> In any case, it lets you know if specific passwords you're using may
>> be compromised...
>
> Good thing.
>
> I DL'd an earlier RockYou and exported my passwords from 1Password to
> a flatfile (.txt). The obtuse 1Password text file format (clearly
> "evolved over time" <cough>) took some time to code for. This program
> searched all my passwords against the RockYou file. One showed up. A
> complex password that some company generously leaked to the world once
> upon a time. While I had changed the password on the site I hadn't
> flushed the backup of it from 1P and it was in the 1P file... since
> abandoned that co. but a copy of that pw is forever in Rockyou
> variants.

The current version of rockyou2024.txt is here, for anyone interested:

magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

--
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Alan Browne
Newsgroups: comp.sys.mac.system
Organization: UsenetServer - www.usenetserver.com
Date: Fri, 12 Jul 2024 00:32 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!fx48.iad.POSTED!not-for-mail
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Content-Language: en-US
Newsgroups: comp.sys.mac.system
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6pek0$2k746$1@dont-email.me> <z7_jO.37974$SLqf.16597@fx15.iad>
<lfbb7oFhto3U1@mid.individual.net>
From: bitbucket@blackhole.com (Alan Browne)
In-Reply-To: <lfbb7oFhto3U1@mid.individual.net>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Lines: 16
Message-ID: <aQ_jO.13239$dnl5.73@fx48.iad>
X-Complaints-To: abuse@usenetserver.com
NNTP-Posting-Date: Fri, 12 Jul 2024 00:32:06 UTC
Organization: UsenetServer - www.usenetserver.com
Date: Thu, 11 Jul 2024 20:32:06 -0400
X-Received-Bytes: 1346
View all headers

On 2024-07-11 20:21, Jolly Roger wrote:

> The current version of rockyou2024.txt is here, for anyone interested:
>
> magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

Nothing coming of that. I'll get it elsewhere.

Have to re-gen that 1P text file from the old iMac. Not the sort of
thing you leave around unencrypted.

--
"It would be a measureless disaster if Russian barbarism overlaid
the culture and independence of the ancient States of Europe."
Winston Churchill

Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password leak ever
From: Jörg Lorenz
Newsgroups: comp.mobile.android, misc.phone.mobile.iphone, comp.sys.mac.system
Organization: Camembert Normand au Lait Cru
Date: Fri, 12 Jul 2024 07:22 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!weretis.net!feeder8.news.weretis.net!reader5.news.weretis.net!news.solani.org!.POSTED!not-for-mail
From: hugybear@gmx.net (Jörg Lorenz)
Newsgroups: comp.mobile.android,misc.phone.mobile.iphone,comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
leak ever
Date: Fri, 12 Jul 2024 09:22:16 +0200
Organization: Camembert Normand au Lait Cru
Message-ID: <v6qlj7$hi9s$1@solani.org>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
<v6ljqr$1rgur$1@dont-email.me> <v6m41f$dvu5$1@solani.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Injection-Date: Fri, 12 Jul 2024 07:22:16 -0000 (UTC)
Injection-Info: solani.org;
logging-data="575804"; mail-complaints-to="abuse@news.solani.org"
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:115.0) Gecko/20100101
Betterbird/115.13.0
Cancel-Lock: sha1:rUcPG5zudpiMK1LkdJqH4Umz+5U=
X-User-ID: eJwFwQkBwDAIA0BLbfjlLAz8S+idiV/vUDdXW1sSxzYufvmmg8WeKl0WRhpZ6xYZYKrzDB4q9xFD
In-Reply-To: <v6m41f$dvu5$1@solani.org>
Content-Language: de-CH, en-GB
View all headers

On 10.07.24 15:58, Nick Cine wrote:
> Nobody needs your opinion, Arlen.

Arlen. You are a primitive and brain dead Troll.

--
"De gustibus non est disputandum."

Pages:12

rocksolid light 0.9.8
clearnet tor