nanog mailing list archives
Re: LinkedIn password database compromised
From: "Aaron C. de Bruyn" <aaron () heyaaron com>
Date: Wed, 6 Jun 2012 19:43:42 -0700
On Wed, Jun 6, 2012 at 7:19 PM, Marshall Eubanks <marshall.eubanks () gmail com> wrote:
On Wed, Jun 6, 2012 at 9:33 PM, Lynda <shrdlu () deaddrop org> wrote:In other words, if you have a LinkedIn account, expect that the password has been stolen. Go change your password now. If you used that password elsewhere, you know the routine. In addition, as has been pointed out elsewhere, there's no sign LI has fixed the problem. Expect that the password you change it to will also be compromised.
Why haven't we taken this out of the hands of website operators yet? Why can't I use my ssh-agent to sign in to a website just like I do for about hundred servers, workstations, and my PCs at home? One local password used everywhere that can't be compromised through website stupidity... -A
Current thread:
- LinkedIn password database compromised Lynda (Jun 06)
- Re: LinkedIn password database compromised Marshall Eubanks (Jun 06)
- Re: LinkedIn password database compromised Aaron C. de Bruyn (Jun 06)
- Re: LinkedIn password database compromised Jimmy Hess (Jun 06)
- Re: LinkedIn password database compromised Aaron C. de Bruyn (Jun 06)
- Re: LinkedIn password database compromised James Snow (Jun 07)
- Re: LinkedIn password database compromised Peter Kristolaitis (Jun 07)
- Re: LinkedIn password database compromised JC Dill (Jun 07)
- Re: LinkedIn password database compromised Aaron C. de Bruyn (Jun 07)
- Re: LinkedIn password database compromised Owen DeLong (Jun 07)
- Re: LinkedIn password database compromised Mark Andrews (Jun 07)
- Re: LinkedIn password database compromised Randy Bush (Jun 07)
- Re: LinkedIn password database compromised Sean Harlow (Jun 07)
- Re: LinkedIn password database compromised Aaron C. de Bruyn (Jun 06)
- Re: LinkedIn password database compromised Marshall Eubanks (Jun 06)