Hacker Newsnew | past | comments | ask | show | jobs | submit | esnard's commentslogin

Wow, is it related to the "make me a sandwich" XKCD?

https://xkcd.com/149/


You do realize the answer is right there: https://www.sudo.ws/about/logo/

(and the old logo) ;)


I missed that, thanks!

No more vulnerabilities then I guess!

I spoke to a few people living in Iran, and they definitively confirmed that 100+ people died. They obviously don't have the exact number, so that 36,500 figure might be exaggerated, but there are more than enough videos online to verify the 100+ claim if you really want to.

Sure you did.

If you're using the same domain for each of your email address, HIBP has a domain-wide search feature which is free (but you need to register to validate your domain)


I've registered (years and years ago) and I get emails saying how many, but to see which emails they want lots of money.

(If I'm wrong their interface is very confusing and I cannot find the free access.)

Specifically it says this:

> Insufficient subscription. Only subscription-free breaches will be returned for this domain.

So I'm able to see 37 email addresses on my domain have been breaches, but I can't see which without paying $22 / month - https://haveibeenpwned.com/Subscription

> Domain search restricted: You don't have an active subscription so you're limited to searching domains with up to 10 breached addresses (excluding addresses in spam lists). Only results for subscription-free breaches are shown below, upgrade your subscription to run a complete domain search. If you believe you're seeing this message in error, make sure you're signing in to the dashboard with the correct email address (check your latest receipt if you're unsure).


Quoting Troy from a thread beneath the article:

> The easiest approach in that case is to take out the subscription, then immediately cancel it. It'll still last the full month, more here: https://support.haveibeenpwned.com/hc/en-au/articles/7707041...


5894 means that the password appeared 5894 times in the dataset.

5894 is not the password associated with the hash.


Yes, it did mean what I thought, then.

But I guess some passwords appear far more often than that in the dataset.


Some passwords are far more commonly used than others; that isn't surprising.


Link for anyone willing to contribute: https://github.com/bagder/http3-explained

Looks unmaintained, though.


I know nothing about the Ruby ecosystem, but I really do appreciate that someone cares that much to mediate this mess. Thank you.


> This feature is available in English for users in the US, Canada, UK, and Australia, and is being introduced gradually to ensure great performance and quality.

Not available in Italy yet.


You can enable it by setting 'browser.ml.linkPreview.enabled' to true via about:config. A restart of Firefox is required.


Weird. The file was cracked in May 2024, while the password had appeared in a database leak which was added in HIBP (and thus pretty much public) back in October 2017.

Unsure why it took the community so long to crack the file.


the salt for the passwords in the bitly breach isn't known, and the few plaintexts available were lost to time


The cracking basically started the moment youtubers presented it as 'a mystery'.


Note: one of the founders of the World app is Sam Altman.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: