this post was submitted on 09 Nov 2025
433 points (96.4% liked)

Technology

76670 readers
2028 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Use the "passwords" feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They'll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

top 50 comments
sorted by: hot top controversial new old
[–] baduhai@sopuli.xyz 8 points 2 hours ago (2 children)

Why did you censor yourself in the title?

[–] SCmSTR@lemmy.blahaj.zone 0 points 1 hour ago

Probably because they primarily live in a censorship world, be it digital or in-person, and change is difficult for most people.

[–] Pauce@lemmy.ca -1 points 2 hours ago* (last edited 2 hours ago) (1 children)
[–] DamnianWayne@lemmy.world 0 points 1 hour ago

what ******* memo?

[–] DamnianWayne@lemmy.world 2 points 1 hour ago

This is why my password is hunter2, no one can see what is says under the asterix,

[–] 1984@lemmy.today 61 points 14 hours ago* (last edited 14 hours ago) (2 children)

For me, if this happens, it has no impact since almost every page i sign up to has a unique password. The most important ones has mfa as well.

Use a password manager. Simple.

[–] IMALlama@lemmy.world 1 points 5 hours ago (1 children)

Same, but I do have some level of worry regarding portability. My solution isn't local or self hosted, as I was looking for easy and works across Linux/Windows/Mac/Android/iOS. I do not look forward to needing to change to a new password manager in the future, but given the way everything seems to be going it seems likely that I'll have to at some point.

[–] L7HM77@sh.itjust.works 1 points 1 hour ago

KeePass and syncthing. I use Keepass2 on a Linux desktop and laptop, KeePassDX on Android, and use syncthing to keep everything synchronized and up to date, also using an old raspberry pi to act as a central server for syncthing.

Modifying the database on one device seamlessly updates the other devices once they're visible on the network, everything works beautifully and is very easy to set up on a local network.

Pretty much default configuration all the way around, just gotta make sure syncthing starts on boot. Just did a brief search, syncthing seems to have a MacOS fork, and iOS will need Möbius Sync, which is paid but the free tier offers 20MB storage sync which is overkill for KeePass.

[–] digdilem@lemmy.ml 23 points 14 hours ago (4 children)

Right answer. In fact, the only viable answer.

load more comments (4 replies)
[–] anas@lemmy.world 5 points 9 hours ago

Apparently my email was included in this breach, but my none of the passwords I used with it (before I started using randomly generated ones).

[–] RememberTheApollo_@lemmy.world 9 points 11 hours ago

Comprised of email addresses and passwords from previous data breaches,

So these are previously “hacked” data, and now the aggregator has been hacked?

[–] tym@lemmy.world 13 points 13 hours ago* (last edited 13 hours ago)

As someone who consults in the IT Security space, It's bad out there. Contractors and BYOD companies are downright sheepish in asking their outsourced employees to do anything security-related to their devices. The biggest attack vector is allowed unfettered remote access (and therefore the whole company and any bad actors are also granted unfettered remote access)

I still can't get over how quickly companies-at-large have abandoned VPN Servers (removing network trust from the list of options as well)

I'm down to managed browsers via IdP, and I just can't wait for the objections to that as well. People out here offering their faces to leopards. Certificate-based MFA on all the things IMO - passwords shouldnt matter (but six digit MFA codes aren't immune to fake landing pages and siphoned MFA tokens that don't expire)

[–] BombOmOm@lemmy.world 316 points 1 day ago (79 children)

Protip for the room: Use a password manager with a unique password for every service. Then when one leaks, it only affects that singular service, not large swaths of your digital life.

[–] sobchak@programming.dev 5 points 15 hours ago* (last edited 15 hours ago) (2 children)

I was thinking about this earlier. The password manager browser plugin I use (Proton Pass) defaults to staying unlocked for the entire browser session. If someone physically gained access to my PC while my password manager was unlocked, they'd be able to access absolutely every password I have. I changed the behavior to auto-lock and ask for a 6-digit PIN, but I'm guessing it wouldn't take an impractical amount of time to brute-force a 6-digit PIN.

Before I started use a password manager, I'd use maybe 3-4 passwords for different "risks," (bank, email, shopping, stupid shit that made me sign up, etc). Not really sure if a password manager is better (guess it depends on the "threat" you're worried about).

Edit: Also on my phone, it just unlocks with a fingerprint, and I think law enforcement are allowed to force you to biometrically unlock stuff (or can unlock with fingerprints they have on file).

[–] gian@lemmy.grys.it 8 points 11 hours ago

If someone can gain physical access to your PC you are done anyway, he van simply copy the file or do whatwver he want

Yes, it is better. The likelihood that someone will physically access your device is incredibly low, the likelihood that one of the services in your bucket gets leaked and jeopardizes your other accounts is way higher.

I set mine to require my password after a period of time on certain devices (the ones I'm likely to lose), and all of them require it when restarting the browser.

it just unlocks with a fingerprint, and I think law enforcement are allowed to force you to biometrically unlock stuff

True, but it's also highly unlikely that LE will steal your passwords.

My phone requires a PIN after X hours or after a few failed fingerprint attempts, and it's easy to fail without being sus. In my country, I cannot be forced to reveal a PIN. If I travel to a sketchy country or something, i switch it to a password unlock.

[–] artyom@piefed.social 93 points 1 day ago (3 children)
[–] stealth_cookies@lemmy.ca 36 points 21 hours ago (4 children)

I hate how many places don't allow for + aliases. I want to know who leaked my email.

[–] Fmstrat@lemmy.world 4 points 12 hours ago

+ aliases are convenience aliases only. They are often stripped from ID datasets. Better to use a real alias.

[–] T156@lemmy.world 15 points 19 hours ago (2 children)

At the same time, it is trivially easy to strip a + alias, so I'd not trust it to do anything much at all.

load more comments (2 replies)
[–] artyom@piefed.social 19 points 20 hours ago* (last edited 8 hours ago)

No + required. There are hundreds of companies offering aliases using their shared domain. You can also just generate a temporary email address if you don't require any ongoing communication and the account is not super important.

load more comments (1 replies)
load more comments (2 replies)
load more comments (77 replies)
[–] Wispy2891@lemmy.world 14 points 19 hours ago (1 children)

Let's make a master list of all the emails leaked with their passwords, what could go wrong?

[–] felixwhynot@lemmy.world 19 points 17 hours ago (1 children)
[–] Wispy2891@lemmy.world 18 points 16 hours ago (3 children)

It's exactly how it worked. A company called synthient made a master list with all the leaked emails + all leaked passwords. Then they were hacked and it leaked

[–] ChogChog@lemmy.world 14 points 11 hours ago (1 children)

Synthient wasn’t hacked, as a security company, they aggregated tons of stealer logs dumped to social media, Telegram, etc.

They found 8% of the data collected was not in the HIBP database, confirmed with some of the legitimate owners that the data was real.

They then took that research and shared it with HIBP which is the correct thing to do.

I was also thrown off by the title they gave it when I first saw it, a security company being hacked would be a terrible look. but they explain it in the article. Should probably have named it “list aggregation” or something.

[–] Wispy2891@lemmy.world 0 points 7 hours ago

so why hibp calls them data breach??? Ultra misleading, almost defamation, everyone including me only reads the headlines

[–] ExLisper@lemmy.curiana.net 12 points 16 hours ago

Someone should make a list of all the leaked credentials that got leaked.

[–] MrScottyTay@sh.itjust.works 7 points 16 hours ago

But then nothing has changed if they were just collating what was already leaked.

load more comments
view more: next ›