[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
LinkedIn password database compromised
- Subject: LinkedIn password database compromised
- From: aaron at heyaaron.com (Aaron C. de Bruyn)
- Date: Wed, 6 Jun 2012 19:43:42 -0700
- In-reply-to: <CAJNg7V+HFuXeDN7s8EoGX=LXhH1ePLEk88n8uPWyNCSU2KjD7A@mail.gmail.com>
- References: <[email protected]> <CAJNg7V+HFuXeDN7s8EoGX=LXhH1ePLEk88n8uPWyNCSU2KjD7A@mail.gmail.com>
On Wed, Jun 6, 2012 at 7:19 PM, Marshall Eubanks
<marshall.eubanks at gmail.com> wrote:
> On Wed, Jun 6, 2012 at 9:33 PM, Lynda <shrdlu at deaddrop.org> wrote:
>> In other words, if you have a LinkedIn account, expect that the password has
>> been stolen. Go change your password now. If you used that password
>> elsewhere, you know the routine. In addition, as has been pointed out
>> elsewhere, there's no sign LI has fixed the problem. Expect that the
>> password you change it to will also be compromised.
Why haven't we taken this out of the hands of website operators yet?
Why can't I use my ssh-agent to sign in to a website just like I do
for about hundred servers, workstations, and my PCs at home?
One local password used everywhere that can't be compromised through
website stupidity...
-A