Conversation
Notices
-
@mcscx@quitter.se (mcscx@quitter.se)'s status on Sunday, 03-Aug-2014 07:47:35 UTC @mcscx@quitter.se ... en: Mozilla server #fail: thousands of developer mail addresses & passwords #compromised -
@mcscx@quitter.se (mcscx@quitter.se)'s status on Sunday, 03-Aug-2014 16:14:22 UTC @mcscx@quitter.se #Mozilla Developer Network: accidental disclosure of 76000 email addresses and 4000 encrypted passwords http://qttr.at/dc0 -
Paul Pritchard (expatpaul@quitter.se)'s status on Sunday, 03-Aug-2014 17:41:47 UTC Paul Pritchard @mcscx Oops. -
@mcscx@quitter.se (mcscx@quitter.se)'s status on Sunday, 03-Aug-2014 20:01:22 UTC @mcscx@quitter.se @expatpaul @lnxw48 I wonder how it's at all possible to expose the real passwords. Why don't they only store the password _hashes_? -
Temporary Marjolein (mk@oracle.skilledtests.com)'s status on Sunday, 03-Aug-2014 20:26:50 UTC Temporary Marjolein @mcscx I see mention only of 4000 "encrypted psswords" -
Temporary Marjolein (mk@oracle.skilledtests.com)'s status on Sunday, 03-Aug-2014 20:27:57 UTC Temporary Marjolein @mk +a -
@mcscx@quitter.se (mcscx@quitter.se)'s status on Sunday, 03-Aug-2014 20:36:24 UTC @mcscx@quitter.se @mk ok, you're right."Encrypted passwords" is what I had quoted myself, but later I forgot the "encrypted".
-