this post was submitted on 09 Nov 2025
494 points (96.8% liked)

Technology

76945 readers
3271 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Use the "passwords" feature to check if one of yours is compromised. If it shows up, never ever reuse those credentials. They'll be baked into thousands of botnets etc. and be forevermore part of automated break-in attempts until one randomly succeeds.

top 50 comments
sorted by: hot top controversial new old
[–] BombOmOm@lemmy.world 328 points 1 week ago (76 children)

Protip for the room: Use a password manager with a unique password for every service. Then when one leaks, it only affects that singular service, not large swaths of your digital life.

[–] artyom@piefed.social 96 points 1 week ago (2 children)
[–] stealth_cookies@lemmy.ca 40 points 1 week ago (5 children)

I hate how many places don't allow for + aliases. I want to know who leaked my email.

[–] artyom@piefed.social 22 points 1 week ago* (last edited 1 week ago)

No + required. There are hundreds of companies offering aliases using their shared domain. You can also just generate a temporary email address if you don't require any ongoing communication and the account is not super important.

[–] T156@lemmy.world 20 points 1 week ago (2 children)

At the same time, it is trivially easy to strip a + alias, so I'd not trust it to do anything much at all.

load more comments (2 replies)
load more comments (3 replies)
[–] wreckedcarzz@lemmy.world 14 points 1 week ago (1 children)
load more comments (1 replies)
[–] Dave@lemmy.nz 57 points 1 week ago (1 children)

Don't forget unique email addresses. I've had two spam emails in the last 6 months, I could trace them to exactly which company I gave that email address to (one data breach, one I'm pretty sure was the company selling my data). I can block those addresses and move on with my life.

My old email address from before I started doing this still receives 10+ spam emails a day.

[–] BitsAndBites@lemmy.world 9 points 1 week ago (1 children)

I've started using {emailaddress}+{sitename}@gmail.com i.e. myemail+xyzCompany@gmail.com

That way I can at least see who sold my info. I wish I would have started doing this long ago though. Some sites dont let you use the plus symbol even though it's valid though

[–] akilou@sh.itjust.works 34 points 1 week ago (1 children)

This trick is common enough and trivial to reverse engineer. I can just purge my billion-email-address hacked list of all characters between a + and an @ and have a clean list that untraceable with your system.

[–] AMillionMonkeys@lemmy.world 12 points 1 week ago (1 children)

Right? Has this ever worked for anyone? I've never bothered because of how easy it is for spammers to bypass.

[–] Scubus@sh.itjust.works 18 points 1 week ago* (last edited 1 week ago)

Spammers go for the easiest targets. If you do stuff like this, they might redesign their system to make it LESS likely to send to you. Keep in mind theyre targetting the elederly, mentally handicapped, and the emotionally desperate. They specifically DO NOT want to target the educated, technologically literate, and those that will waste their time. By attempting to technologically limit them from their scams, you make it more difficult for them to target you and it makes it obvious theyre not worth your time.

Its not about making yourself scam proof, its about making yourself an unappealing target.

(This all applies to scam emails, dunno if it has any effect if the goal is phishing but i would imagine so. If they can phish 5 people in the time it takes to phish you, youre no longer their target.)

Edit: this is why scam emails look obviously scammy, with misspelled words and grammarical errors. Its not a mistake, its an attempt to preemptively weed out people who want to waste their time

[–] BrianTheeBiscuiteer@lemmy.world 53 points 1 week ago

Also 2FA. You'll still want to change passwords but it buys you time.

[–] blazeknave@lemmy.world 8 points 1 week ago (8 children)

Also, length is most of what matters. A full length sentence in lowercase with easy to type finger/key flow for pw manager master, and don't know a single other password. Can someone correct me if I'm wrong?

load more comments (8 replies)
load more comments (72 replies)
[–] 1984@lemmy.today 73 points 1 week ago* (last edited 1 week ago) (15 children)

For me, if this happens, it has no impact since almost every page i sign up to has a unique password. The most important ones has mfa as well.

Use a password manager. Simple.

load more comments (15 replies)
[–] paraphrand@lemmy.world 29 points 1 week ago (1 children)

Stuffing? Just in time for the holiday season!

[–] wreckedcarzz@lemmy.world 13 points 1 week ago (1 children)

moans "stuff me santa"

Santa: "we are skipping that house"

[–] YiddishMcSquidish@lemmy.today 8 points 1 week ago

This is the type of unhinged shit I signed up for!

[–] floofloof@lemmy.ca 21 points 1 week ago* (last edited 1 week ago) (5 children)

The thing about this one is no one seems sure of the source (it appears to be from multiple sources, including infostealer malware and phishing attacks), so you don't know which passwords to change. To be safe you'd have to do all of them.

Some password managers (e.g. Bitwarden) offer an automatic check for whether your actual passwords have been seen in these hack databases, which is a bit more practical than changing hundreds of passwords just in case.

And of course don't reuse passwords. If you have access to an email masking service you can not only use a different password for every site, but also a different email address. Then hackers can't even easily connect that it's your account on different sites.

load more comments (5 replies)
[–] baduhai@sopuli.xyz 19 points 1 week ago (8 children)

Why did you censor yourself in the title?

load more comments (8 replies)
[–] frostysauce@lemmy.world 18 points 1 week ago

God fucking dammit, I fucking hate seeing people self-censor themselves on the internet.

[–] tym@lemmy.world 15 points 1 week ago* (last edited 1 week ago) (1 children)

As someone who consults in the IT Security space, It's bad out there. Contractors and BYOD companies are downright sheepish in asking their outsourced employees to do anything security-related to their devices. The biggest attack vector is allowed unfettered remote access (and therefore the whole company and any bad actors are also granted unfettered remote access)

I still can't get over how quickly companies-at-large have abandoned VPN Servers (removing network trust from the list of options as well)

I'm down to managed browsers via IdP, and I just can't wait for the objections to that as well. People out here offering their faces to leopards. Certificate-based MFA on all the things IMO - passwords shouldnt matter (but six digit MFA codes aren't immune to fake landing pages and siphoned MFA tokens that don't expire)

load more comments (1 replies)
[–] Wispy2891@lemmy.world 13 points 1 week ago (1 children)

Let's make a master list of all the emails leaked with their passwords, what could go wrong?

[–] felixwhynot@lemmy.world 20 points 1 week ago (1 children)
[–] Wispy2891@lemmy.world 17 points 1 week ago (3 children)

It's exactly how it worked. A company called synthient made a master list with all the leaked emails + all leaked passwords. Then they were hacked and it leaked

[–] ChogChog@lemmy.world 21 points 1 week ago (1 children)

Synthient wasn’t hacked, as a security company, they aggregated tons of stealer logs dumped to social media, Telegram, etc.

They found 8% of the data collected was not in the HIBP database, confirmed with some of the legitimate owners that the data was real.

They then took that research and shared it with HIBP which is the correct thing to do.

I was also thrown off by the title they gave it when I first saw it, a security company being hacked would be a terrible look. but they explain it in the article. Should probably have named it “list aggregation” or something.

load more comments (1 replies)
[–] ExLisper@lemmy.curiana.net 11 points 1 week ago (1 children)

Someone should make a list of all the leaked credentials that got leaked.

load more comments (1 replies)
load more comments (1 replies)
[–] FlashMobOfOne@lemmy.world 11 points 1 week ago (1 children)

Proud that my only pwned password is three decades old.

load more comments (1 replies)

Yeah gotta make sure you never use the same password in multiple places, use a password manager.

Comprised of email addresses and passwords from previous data breaches,

So these are previously “hacked” data, and now the aggregator has been hacked?

load more comments
view more: next ›