Use the “passwords” feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They’ll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

  • BombOmOm@lemmy.world
    link
    fedilink
    English
    arrow-up
    6
    ·
    3 months ago

    Protip for the room: Use a password manager with a unique password for every service. Then when one leaks, it only affects that singular service, not large swaths of your digital life.

        • T156@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 months ago

          At the same time, it is trivially easy to strip a + alias, so I’d not trust it to do anything much at all.

          • Miaou@jlai.lu
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            If you use aliases for all services, it makes it slightly harder to automate trying one leaked email on another site, since the hacker needs to add the new alias on the other service.

            No one is going through of all these credentials manually, so any extra obscurity can actually bring you security in a pinch. Although if you have different passwords this shouldn’t matter much…

            • Anivia@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              2 months ago

              No, you just run a simple Regex on both combolists and are done. It literally takes seconds

        • artyom@piefed.social
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          2 months ago

          No + required. There are hundreds of companies offering aliases using their shared domain. You can also just generate a temporary email address if you don’t require any ongoing communication and the account is not super important.

        • CodenameDarlen@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          3 months ago

          Even if your alias is leaked they can remove the + part and it’ll lead to your original email without aliases. They probably do some data formatting on emails to no get caught so easily and obviously.

        • Fmstrat@lemmy.world
          link
          fedilink
          English
          arrow-up
          0
          ·
          2 months ago

          + aliases are convenience aliases only. They are often stripped from ID datasets. Better to use a real alias.

    • Weslee@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      2 months ago

      I use a “password pattern”, rather than remembering all the passwords, I just remember a rule I have for how passwords are done, there are some numbers and letters that change depending on what the service is so every password is unique and I can easily remember all of them as long as I remember the rules I put in place

        • imetators@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 months ago

          That is assuming that someone will sit there and try to decrypt password rules for that specific person. Chances of that happening are basically 0, unless they are some sort of a high interest person.

    • blazeknave@lemmy.world
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Also, length is most of what matters. A full length sentence in lowercase with easy to type finger/key flow for pw manager master, and don’t know a single other password. Can someone correct me if I’m wrong?

    • Dave@lemmy.nz
      link
      fedilink
      English
      arrow-up
      0
      ·
      3 months ago

      Don’t forget unique email addresses. I’ve had two spam emails in the last 6 months, I could trace them to exactly which company I gave that email address to (one data breach, one I’m pretty sure was the company selling my data). I can block those addresses and move on with my life.

      My old email address from before I started doing this still receives 10+ spam emails a day.

      • BitsAndBites@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        I’ve started using {emailaddress}+{sitename}@gmail.com i.e. myemail+xyzCompany@gmail.com

        That way I can at least see who sold my info. I wish I would have started doing this long ago though. Some sites dont let you use the plus symbol even though it’s valid though

        • akilou@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          0
          ·
          3 months ago

          This trick is common enough and trivial to reverse engineer. I can just purge my billion-email-address hacked list of all characters between a + and an @ and have a clean list that untraceable with your system.

      • ayyy@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        0
        ·
        3 months ago

        Got any examples? Because I have…some…examples of password reuse being a real-life problem.

          • Aetherion@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            2 months ago

            LastPass is the maximum shit. They got hacked like 3 times in a year and my company‘s password notes got leaked.

            We are now with Bitwarden and this was the biggest security hardening measure we have taken.

  • 1984@lemmy.today
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    2 months ago

    For me, if this happens, it has no impact since almost every page i sign up to has a unique password. The most important ones has mfa as well.

    Use a password manager. Simple.

  • floofloof@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    3 months ago

    The thing about this one is no one seems sure of the source (it appears to be from multiple sources, including infostealer malware and phishing attacks), so you don’t know which passwords to change. To be safe you’d have to do all of them.

    Some password managers (e.g. Bitwarden) offer an automatic check for whether your actual passwords have been seen in these hack databases, which is a bit more practical than changing hundreds of passwords just in case.

    And of course don’t reuse passwords. If you have access to an email masking service you can not only use a different password for every site, but also a different email address. Then hackers can’t even easily connect that it’s your account on different sites.

  • Wispy2891@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    3 months ago

    Let’s make a master list of all the emails leaked with their passwords, what could go wrong?

      • Wispy2891@lemmy.world
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        It’s exactly how it worked. A company called synthient made a master list with all the leaked emails + all leaked passwords. Then they were hacked and it leaked

        • ChogChog@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          2 months ago

          Synthient wasn’t hacked, as a security company, they aggregated tons of stealer logs dumped to social media, Telegram, etc.

          They found 8% of the data collected was not in the HIBP database, confirmed with some of the legitimate owners that the data was real.

          They then took that research and shared it with HIBP which is the correct thing to do.

          I was also thrown off by the title they gave it when I first saw it, a security company being hacked would be a terrible look. but they explain it in the article. Should probably have named it “list aggregation” or something.

    • SCmSTR@lemmy.blahaj.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      Probably because they primarily live in a censorship world, be it digital or in-person, and change is difficult for most people.

    • sik0fewl@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      They’ll censor “fucking”, but still use the Lord’s name in vain. smh.

      • Echo Dot@feddit.uk
        link
        fedilink
        English
        arrow-up
        1
        ·
        2 months ago

        You’re allowed to swear on the internet as long as you’re not one of the weird instances.

    • Taleya@aussie.zone
      link
      fedilink
      English
      arrow-up
      1
      ·
      2 months ago

      I’ve been “pwned” four times.

      None of them due to my end. Every single fucker was a piss poor company security