For those who haven't heard the story the details were pulled from a Christian dating site db.singles.org which had a query parameter injection vulnerability.<p>The vulnerability allowed you to navigate to a person's profile by entering the user id and skipping authentication.<p>Once you got there the change password form had the passwords in plain text. Someone wrote a scraper and now the entire database is on Mediafire and contains thousands of email/password combinations.
Now we find out that HN is really full of the immature that think it's hilarious to break into peoples stuff and vandalise it, just to see if you can make them cry.<p>I genuinely thought people here would have more compassion and sense of decency than 4chan.
Another solid reason why you should never use the same password for multiple sites. To do so, you are effectively trusting every single site in the chain.<p>I read enough HN and Codinghorror to know that many sites have no clue how to handle passwords in a secure fashion.
Will 4Chan someday evolve into Vinge's 'Friends of Privacy', filling the net with lies to create doubt about all the revelations available online? (Personal info chaff, of a sort.)<p>('Friends of Privacy' is a anonymous mass group in Vinge's <i>Rainbow's End</i>.)
If you read the replies on the screenshot, you notice the OP's sister posts a message (granted, we don't know if it's for sure the OP's sister, but it is implied). The interesting part is that the last name of the "sister" is not blurred, whereas the OP's is. Maybe she's married and has a different last name though.
There is another thread in this article asking how I would feel if this happened to a friend. The answer is "I don't care". I thought a bit about how this would make me feel if it happened to me, and the answer is "I don't care, because I don't use Facebook".<p>I then thought about what would upset me, and I realized that I would be upset if someone edited my blog and added random technical inaccuracies.<p>Then I realized that I digitally sign all of my blog posts, so this is mathematically infeasible.<p>(Example post: <a href="http://blog.jrock.us/articles/App::Persistent.pod/raw" rel="nofollow">http://blog.jrock.us/articles/App::Persistent.pod/raw</a>)
This is the typical way to 'use' 4chan. One of the few guys there with a bit of knowledge breaks into something, gets a list and then his job is done.
Post the list to 4chan and have that community wreak havok with it. 4Chan is a semi-intelligent botnet.