• Re: RockYou2024 leak of 10 billion passwords - the biggest password lea

    From Fishrrman@21:1/5 to Mickey D on Thu Jul 11 16:17:03 2024
    On 7/6/24 7:28 PM, Mickey D wrote:
    Cybernews researchers discovered what appears to be the largest password compilation with a staggering 9,948,575,739 unique plaintext passwords. The file with the data, titled rockyou2024.txt, was posted on July 4th by forum user ObamaCare.


    I'm currently experimenting with Apple's new OS 15 "Sequoia"
    on an external SSD.

    One of the new features of this release will be the Apple
    "Passwords" app.

    Although (up to this point) I've kept all my passwords in a
    self-created database, I opened Passwords to see what it was
    like.

    It had already compiled a list of passwords that I'd been
    using on the experimental Sequoia SSD.

    But one feature that looked welcome was...
    ... it identified two of my passwords that may have recently
    been "compromised". It looks like the Passwords app is
    reaching into some "resevoir" of "known-compromised"
    passwords, or perhaps even Apple has acquired some of these
    giant purloined password files.

    In any case, it lets you know if specific passwords you're
    using may be compromised...

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Fishrrman on Thu Jul 11 20:27:20 2024
    On 2024-07-11, Fishrrman <Fishrrman2000@yahoo.com> wrote:

    I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
    external SSD.

    One of the new features of this release will be the Apple "Passwords"
    app.

    Although (up to this point) I've kept all my passwords in a
    self-created database, I opened Passwords to see what it was like.

    It had already compiled a list of passwords that I'd been using on the experimental Sequoia SSD.

    Those are passwords you entered in Safari presumably, which stored them
    in the Keychain. In previous releases Keychain passwords were accessible
    either in the System Settings > Passwords pane or in the Keychain app, depending on the macOS release version.

    But one feature that looked welcome was... ... it identified two of
    my passwords that may have recently been "compromised". It looks like
    the Passwords app is reaching into some "resevoir" of
    "known-compromised" passwords, or perhaps even Apple has acquired some
    of these giant purloined password files.

    In any case, it lets you know if specific passwords you're using may
    be compromised...

    Yes, that's been a Keychain feature for some time now. It even has
    buttons that take you to the website in question to change your password
    there. It's pretty handy.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Fishrrman on Thu Jul 11 19:44:31 2024
    On 2024-07-11 16:17, Fishrrman wrote:
    On 7/6/24 7:28 PM, Mickey D wrote:
    Cybernews researchers discovered what appears to be the largest password
    compilation with a staggering 9,948,575,739 unique plaintext
    passwords. The
    file with the data, titled rockyou2024.txt, was posted on July 4th by
    forum
    user ObamaCare.


    I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
    external SSD.

    One of the new features of this release will be the Apple "Passwords" app.

    Although (up to this point) I've kept all my passwords in a self-created database, I opened Passwords to see what it was like.

    It had already compiled a list of passwords that I'd been using on the experimental Sequoia SSD.

    But one feature that looked welcome was...
    ... it identified two of my passwords that may have recently been "compromised". It looks like the Passwords app is reaching into some "resevoir" of "known-compromised" passwords, or perhaps even Apple has acquired some of these giant purloined password files.

    In any case, it lets you know if specific passwords you're using may be compromised...

    Good thing.

    I DL'd an earlier RockYou and exported my passwords from 1Password to a flatfile (.txt). The obtuse 1Password text file format (clearly
    "evolved over time" <cough>) took some time to code for. This program
    searched all my passwords against the RockYou file. One showed up. A
    complex password that some company generously leaked to the world once
    upon a time. While I had changed the password on the site I hadn't
    flushed the backup of it from 1P and it was in the 1P file... since
    abandoned that co. but a copy of that pw is forever in Rockyou variants.

    --
    "It would be a measureless disaster if Russian barbarism overlaid
    the culture and independence of the ancient States of Europe."
    Winston Churchill

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Jolly Roger on Thu Jul 11 20:32:06 2024
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that. I'll get it elsewhere.

    Have to re-gen that 1P text file from the old iMac. Not the sort of
    thing you leave around unencrypted.

    --
    "It would be a measureless disaster if Russian barbarism overlaid
    the culture and independence of the ancient States of Europe."
    Winston Churchill

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Alan Browne on Fri Jul 12 00:21:12 2024
    On 2024-07-11, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 16:17, Fishrrman wrote:
    On 7/6/24 7:28 PM, Mickey D wrote:
    Cybernews researchers discovered what appears to be the largest
    password compilation with a staggering 9,948,575,739 unique
    plaintext passwords. The file with the data, titled rockyou2024.txt,
    was posted on July 4th by forum user ObamaCare.

    I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
    external SSD.

    One of the new features of this release will be the Apple "Passwords"
    app.

    Although (up to this point) I've kept all my passwords in a
    self-created database, I opened Passwords to see what it was like.

    It had already compiled a list of passwords that I'd been using on
    the experimental Sequoia SSD.

    But one feature that looked welcome was... ... it identified two of
    my passwords that may have recently been "compromised". It looks like
    the Passwords app is reaching into some "resevoir" of
    "known-compromised" passwords, or perhaps even Apple has acquired
    some of these giant purloined password files.

    In any case, it lets you know if specific passwords you're using may
    be compromised...

    Good thing.

    I DL'd an earlier RockYou and exported my passwords from 1Password to
    a flatfile (.txt). The obtuse 1Password text file format (clearly
    "evolved over time" <cough>) took some time to code for. This program searched all my passwords against the RockYou file. One showed up. A complex password that some company generously leaked to the world once
    upon a time. While I had changed the password on the site I hadn't
    flushed the backup of it from 1P and it was in the 1P file... since
    abandoned that co. but a copy of that pw is forever in Rockyou
    variants.

    The current version of rockyou2024.txt is here, for anyone interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Alan Browne on Fri Jul 12 14:05:05 2024
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that. I'll get it elsewhere.

    Hmm... It's 48.9 GB in size and came in at 6.55 MBps for me.

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Jolly Roger on Fri Jul 12 12:55:04 2024
    On 2024-07-12 10:05, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that. I'll get it elsewhere.

    Hmm... It's 48.9 GB in size and came in at 6.55 MBps for me.

    Not a single peer showed here.

    --
    "It would be a measureless disaster if Russian barbarism overlaid
    the culture and independence of the ancient States of Europe."
    Winston Churchill

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jolly Roger@21:1/5 to Alan Browne on Fri Jul 12 17:38:47 2024
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-12 10:05, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone
    interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that. I'll get it elsewhere.

    Hmm... It's 48.9 GB in size and came in at 6.55 MBps for me.

    Not a single peer showed here.

    Very strange!

    --
    E-mail sent to this address may be devoured by my ravenous SPAM filter.
    I often ignore posts from Google. Use a real news client instead.

    JR

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Jolly Roger on Fri Jul 12 17:44:20 2024
    On 2024-07-12 13:38, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-12 10:05, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone
    interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that. I'll get it elsewhere.

    Hmm... It's 48.9 GB in size and came in at 6.55 MBps for me.

    Not a single peer showed here.

    Very strange!


    Let's try again.

    Exposed to Canada for 1+ minutes: 0 peers
    Exposed to USA for 1+ minutes: 0 peers

    Exposed to Denmark for 15 seconds: 61 peers, 33 connected, 4.9 MB/s and climbing ... looking for 40+ MB/s.
    Hmm . data rates all over the place, alas. (1.5 .. 13 MB/s).
    Usually have a big dog by now.

    Leach: 300 KB/s.

    --
    "It would be a measureless disaster if Russian barbarism overlaid
    the culture and independence of the ancient States of Europe."
    Winston Churchill

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Alan Browne@21:1/5 to Alan Browne on Sat Jul 13 09:46:34 2024
    On 2024-07-12 17:44, Alan Browne wrote:
    On 2024-07-12 13:38, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-12 10:05, Jolly Roger wrote:
    On 2024-07-12, Alan Browne <bitbucket@blackhole.com> wrote:
    On 2024-07-11 20:21, Jolly Roger wrote:

    The current version of rockyou2024.txt is here, for anyone
    interested:

    magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

    Nothing coming of that.  I'll get it elsewhere.

    Hmm... It's 48.9 GB in size and came in at 6.55 MBps for me.

    Not a single peer showed here.

    Very strange!


    Let's try again.

    Exposed to Canada for 1+ minutes: 0 peers
    Exposed to USA for 1+ minutes: 0 peers

    Exposed to Denmark for 15 seconds: 61 peers, 33 connected, 4.9 MB/s and climbing ... looking for 40+ MB/s.
    Hmm . data rates all over the place, alas.  (1.5 .. 13 MB/s).
    Usually have a big dog by now.

    Leach: 300 KB/s.

    Lot of garbage strings in there that likely were not passwords.

    --
    "It would be a measureless disaster if Russian barbarism overlaid
    the culture and independence of the ancient States of Europe."
    Winston Churchill

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)