So I just searched my email on HIBP again. Most of the leaks I see there were from old websites I hardly cared about securing from many years ago. But, in general, how do I find out what has actually been leaked (if it's not website specific)?
I'm not going to change all of my passwords every time a random website that I used briefly ten years ago leaks my low effort password.
There are sites for searching for your (or anyone else's) publicly revealed information, but the one free one I knew of was forced offline.
Downloading the datasets--there are so many with so few options to obtain them. The mega-compilations likely won't include everything, either, like your license plate numbers or all your compromised addresses, nor the site from which hackers stole it.
So basically don't bother. If you want the same experience, open up notepad, HIBP, and your password manager, and make a little doxx file on yourself, in CSV or JSON.
I use separate emails for all accounts and that get's me in trouble when companies "consolidate" accounts because "everyone uses the same email for all accounts". Your good idea might be true, practice is not.
Exactly! Then you write each password down in your notebook of passwords and pat yourself on the back for how hard it would be to compromise all your accounts in one go ;)
It should be a standard practice to have a unique email and password for every service you use out there, plus the usual like 2FA. I have been doing this for years and never had any issue, but also you can tell if the service got compromised even if they never announced it. For example, I have an account on a service called Shakepay, and recently I have been getting a lot of phishing attempts on that specific unique email that's never been used anywhere else. I can tell for certain that their email database got leaked/they sold it.
A lot of email services that provide the aliasing feature have seamless integration with password managers, so when you sign up you generate a unique email and password on the fly, and it get saved in the manager.
Is this even new? Or is this the same bunch of stealer logs that has been floating around repackaged? This 149M is meaningless without removing the already seen entries and getting rid of duplicates.
I have just heard celebrations from millions of AI agents living in data centers cheering on yet another data leak full of unique login data ready to train on.
Now these AI agents are going to use this to get to know about us humans even more.
Companies trust them with their passwords and intellectual property and remain in business. It's insane to me too, but that's the world we actually live in
Reminds me of old IRC where you would trick a noob into revealing their password, then kick them out a bunch until they changed it. Channel would have a good laugh.
I don't understand, why do you say this? I would think that google's security is very solid, and am not aware of them ever being hacked to gain access to user accounts/passwords. Are you saying they're deliberately leaking user passwords to 3rd parties?
I'm not going to change all of my passwords every time a random website that I used briefly ten years ago leaks my low effort password.
Downloading the datasets--there are so many with so few options to obtain them. The mega-compilations likely won't include everything, either, like your license plate numbers or all your compromised addresses, nor the site from which hackers stole it.
So basically don't bother. If you want the same experience, open up notepad, HIBP, and your password manager, and make a little doxx file on yourself, in CSV or JSON.
I've had this twice now in one year ...
Am I a part of this?
If this is a collection of stealer logs, no, but if it is Google & Facebook that have been hacked / had data leaked, then yes.
So far I've not heard anything from either, so I'm gonna assume that it didn't happen through those services until I hear otherwise.
Now these AI agents are going to use this to get to know about us humans even more.
Deleted Comment