GOMTV.net compromised - Page 8
Forum Index > SC2 General |
Raidern
Brazil3811 Posts
| ||
Khanz
France214 Posts
| ||
mmdmmd
722 Posts
| ||
bonifaceviii
Canada2890 Posts
On August 13 2011 03:19 lbmaian wrote: Wow, I didn't expect to be thanking Facebook for my password safekeeping. Seriously. Welp, I guess there's something to be said for having to disable GOM on my Facebook after every time I log in! | ||
DeepBlu2
United States975 Posts
| ||
Bobster
Germany3075 Posts
On August 13 2011 03:16 SniXSniPe wrote: Thankfully I always logged in via Twitter =) Same here. Actually glad I used that feature for once. | ||
Kaiwa
Netherlands2209 Posts
Anyway, I use facebook login so I guess that means not in the crossfire? | ||
Glowbox
Netherlands330 Posts
| ||
valaki
Hungary2476 Posts
On August 13 2011 04:16 Bobster wrote: Same here. Actually glad I used that feature for once. x2, I'm glad, at least for myself. | ||
lostmage333
United States28 Posts
On August 13 2011 03:45 Crying wrote: SHA-1 256/512 even an MD5 can take months to crack. And MD5 salted the salt can be isolated ,and thus negated. Your 14 character long password with uppercase, lowercase, symbols, and numbers isn't anything that won't fail to a sufficiently large rainbowtable attack within minutes. Sure, salting passwords makes them no stronger versus bruteforce/dictionary attacks, but adding a 20 character salt makes it significantly stronger versus rainbowtables, unless a new set of rainbowtables is generated to target that specific salt, which takes a long, long time (but can be reused for extremely fast and efficient attacks on the whole database). All the SHA algorithms also vulnerable to rainbowtables attacks. It's funny how you call out people for not knowing basic cryptography, when you yourself don't know some of the most basic attack methods. I'm not claiming to be some expert, since I'm not, but I do know that you've stated some clearly incorrect statements. That said, it's still sad that GOM stored passwords in plaintext. Just use this as an opportunity to understand the "do not resuse passwords" warning that many sites give. Hopefully it'll get resolved soon. | ||
HydroXy
United States513 Posts
| ||
Caveman255
Israel79 Posts
| ||
PepperoniPiZZa
Sierra Leone1660 Posts
| ||
nalgene
Canada2153 Posts
| ||
KDot2
United States1213 Posts
related or coincidence ? | ||
Aim Here
Scotland672 Posts
Do they even know there's a security problem, and if so, why aren't they telling anyone? | ||
ChowChillaCharlie
Sweden677 Posts
| ||
Jedclark
United Kingdom903 Posts
| ||
Saishuuheiki
United States188 Posts
| ||
sopas
509 Posts
| ||
| ||