TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Yahoo probes possible huge data breach

184 点作者 JohnHammersley将近 9 年前

11 条评论

maldeh将近 9 年前
<i>However, attempts to contact more than 100 of the addresses in the sample saw many returned as undeliverable with auto-responses reading: &quot;This account has been disabled or discontinued,&quot; which might suggest that the data is old.</i><p>Or another sad possibility is that this may be representative of any sample of yahoo email addresses.
评论 #12212703 未加载
评论 #12212367 未加载
评论 #12213516 未加载
评论 #12216741 未加载
gjkood将近 9 年前
In the interest of making this a learning experience for myself and others, I would like to get any feedback on the following questions.<p>What would be considered as strong&#x2F;good&#x2F;secure password&#x2F;authentication algorithms if one had to implement this today?<p>What would you recommend today as a good&#x2F;secure authentication library that one can use with a micro framework like Python Flask (or others)? What about the authentication library in the batteries included Django framework?<p>What about recommended general authentication libraries for other web application frameworks such as Phoenix&#x2F;Elixir, Node based, Go based, etc?<p>Here are some links from OWASP&#x2F;Google that offers some details:<p><a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Cryptographic_Storage_Cheat_Sheet" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Cryptographic_Storage_Cheat_...</a><p><a href="https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Password_Storage_Cheat_Sheet" rel="nofollow">https:&#x2F;&#x2F;www.owasp.org&#x2F;index.php&#x2F;Password_Storage_Cheat_Sheet</a><p><a href="https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1R6c9NW6wtoEoT3CS4UVmthw1a6Ex6TGSBaEqDay5U7g&#x2F;edit" rel="nofollow">https:&#x2F;&#x2F;docs.google.com&#x2F;document&#x2F;d&#x2F;1R6c9NW6wtoEoT3CS4UVmthw1...</a>
评论 #12214952 未加载
评论 #12213784 未加载
评论 #12214419 未加载
adevine将近 9 年前
Am I right in understanding that the passwords were hashed with MD5? WTF?
评论 #12211871 未加载
评论 #12213188 未加载
评论 #12213389 未加载
overcast将近 9 年前
Oh man, all of my spam, and mail from people I didn&#x27;t want having my real address will be compromised.
评论 #12212156 未加载
评论 #12213873 未加载
at-fates-hands将近 9 年前
<i>Using the name Peace, the hacker said the data was &quot;most likely&quot; from 2012.</i><p>So you&#x27;re saying as long as you updated your password from the 2014 breach, you should be fine.
JoelBennett将近 9 年前
Rather timely, given their recent buyout.
评论 #12213247 未加载
Jerry2将近 9 年前
What&#x27;s shocking to me is that Yahoo! still uses MD5 hashes. Those can be decrypted almost instantly with hashcat and tools like it. There&#x27;s some confusion about the age of data in question but I hope they&#x27;ve moved away from MD5 since the breach occurred.
评论 #12212338 未加载
评论 #12211972 未加载
yeukhon将近 9 年前
&gt; The passwords appear to be hashed - which means they have been scrambled - but the hacker has also published details of the algorithm allegedly used for the hash.<p>I like how BBC triedto explain what cryto hash does to plaintext, but this is a poor way to describe what hash is because scramble means re-ordering, but hashing doesn&#x27;t reorder. I hope this reporter takes time to come up with a different way to explain to general public.
shanacarp将近 9 年前
Can I admit seeing this right above the Verizon post (as it is right now) makes me giggle<p>Well, I&#x27;m not sure Verizon is going to love NOT being a dumb pipe...
tanqueray将近 9 年前
If some of these accounts have been deleted how has a hacker got a username and password for them?
评论 #12217673 未加载
Edmond将近 9 年前
Grammar police: &quot;Yahoo probes possibly huge data breach&quot;
评论 #12214012 未加载
评论 #12214062 未加载