[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[ale] Linode hacked, CCs and passwords leaked
- Subject: [ale] Linode hacked, CCs and passwords leaked
- From: leamhall at gmail.com (leam hall)
- Date: Tue, 16 Apr 2013 10:53:59 -0400
- In-reply-to: <CAA+8RQbw3kgrMvf_8pN7Zm4QQVT65-+cNB=Fj=Z+j0-W2Ct=VQ@mail.gmail.com>
- References: <[email protected]> <CAAt=rgAD-cgRakfVaSfBn_UL049kC+WzwE1z1XW9fmqAKt6R9g@mail.gmail.com> <[email protected]> <CAA+8RQbw3kgrMvf_8pN7Zm4QQVT65-+cNB=Fj=Z+j0-W2Ct=VQ@mail.gmail.com>
One more reason I'm glad we don't have credit cards.
On Tue, Apr 16, 2013 at 10:40 AM, Chuck Peters <cp at axs.org> wrote:
>
> http://blog.linode.com/2013/04/16/security-incident-update/ says:
> Credit card numbers... The private key is itself encrypted with
> passphrase encryption and the complex passphrase is not stored
> electronically. ... We have no evidence decrypted credit card numbers
> were obtained.
>
> Do the crackers have the public and private keys?
>
> And if that /. link to irc stuff is right, they have the public and
> private keys. So how long will it takes to brute force a passphrase. Not
> long I assume...
>
>
>
> Chuck
>
> _______________________________________________
> Ale mailing list
> Ale at ale.org
> http://mail.ale.org/mailman/listinfo/ale
> See JOBS, ANNOUNCE and SCHOOLS lists at
> http://mail.ale.org/mailman/listinfo
>
>
--
Mind on a Mission <http://leamhall.blogspot.com/>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20130416/4dfa4814/attachment.html>