As far as I know, the passwords aren’t stored in the databases, it’s the hash produced by a one-way function that is stored in the database. Grabbing these is useless.
16 Billion Apple, Facebook, Google And Other Passwords Leaked — Act Now
Submitted 5 days ago by return2ozma@lemmy.world to technology@lemmy.world
Comments
tartarin@reddthat.com 5 days ago
orclev@lemmy.world 5 days ago
Hashes can be brute forced, it’s just normally too expensive to do so for any reasonably complex password. If you’re using “password123” as your password even a hashed password is easily cracked (salting and peppering can help make this more difficult, although still not impossible).
tartarin@reddthat.com 5 days ago
I’m perfectly aware anything can be brute forced and that’s why it doesn’t worth to mention. Now, the amount of resources required to brute force a hashed password has nothing to do with the complexity of the password. No matter what the password is, the hash will have a fixed length and appear as a random sequence of bytes. Otherwise you are not doing it properly.
The complexity of the password has something to do with guessing the password from dictionary or known most common passwords.
LWD@lemm.ee 5 days ago
What is this article? Besides terrible, I mean. This article is terrible.
First of all, this isn’t a new leak. It’s not even a combination of old leaks. It’s just somebody noticing that a bunch of leaks existed and did an Excel Sum operation on the passwords on them.
And to add insult to injury, the article has this gem:
Certainly not with writing like this.
ladfrombrad@lemdro.id 5 days ago
Clickbait from Forbes, with not a single mention of 2FA/Two Factor Auth?
files.catbox.moe/n4627i.jpg
Colour me not surprised.
Tregetour@lemdro.id 4 days ago
news.ycombinator.com/item?id=41590466 larslofgren.com/forbes-marketplace/
tldr OP shouldn’t be posting Forbes articles
Cyclist@lemmy.world 5 days ago
And spelling mistakes in an article from Forbes? Total garbage.