Congrats on this

bloomberg.com/news/articles/2018-03-29/under-armour-says-150-million-myfitnesspal-accounts-were-hacked

Attached: 1200x630bb.jpg (630x630, 19K)

Other urls found in this thread:

keepass.info
keepass.info/features.html.
twitter.com/NSFWRedditGif

even easier than selling them to Cambridge Analytics

Oh no. Now people know i eat bananas for breakfast and rice as dinner 6 times per week

(((Bloomberg)))
>nice try kike

This wasn't the weight loss hack I wanted.

Do you write Ladbible titles for a living?

No, but I will if the pay is good.

brb blocking chinese rice farmers spamming me with rice advertisements

FUCK LADS MY GAINS ARE BEING HACKED

Attached: 1400965824720.jpg (1000x676, 95K)

wait, you mean someone is gonna know i eat 13 egg whites a day and a gallon of milk?

hackers have access to your full name, email, hashed password now among 150 million others.

Well shit. ALL I WANTED WAS TO CUT SO I COULD BULK.

>not using generated passwords in 2018
cmon

FUCK now they know that I don't eat clean

Attached: 1518750425757.jpg (700x700, 63K)

i use it to log my malt liquor drinking

FUCK

Attached: gZmiT19.jpg (556x702, 125K)

Thank God I'm not retarded and used a trash email with some random username.

What's myfitness pal?

fuggg

which app should I use instead? it seems like nothing has as good of a database, plus years of use makes logging stuff super quick since I usually eat the same shit most days

>tfw didn't even remember whether I ever signed up there
>tfw had to actually check
>tfw saw that I only have a FDDB account
well, I'm all good apparently. just remembered that I just didn't sign up for myfitnesspal because it had the under armour logo on it

What are hashed passwords? Do they actually know the password by the characters I use or just the encrypted password?

just the encrypted password

but, depending on how good the encryption was and how good your password was, they might be able to figure out your password

fugg, time to change some passwords, I guess.

OH NOES! NOW HACKAZ GONNA KNOW MUH BAD EATING HABITS!

>myfitnesspal password was same password I have used on unimportant accounts for 15 years now
>all important accounts use slightly more complex passwords

I'm not too worried.

cronometer would be god tier if they weren't such fucking jews

>myfitnesspal was hacked
ok so what? now everyone knows what i eat

agreed, cant believe i bought the app and then I realized they still wanted me to pay for the website

This reminds me, I'm starting lose track of all my passwords. Is keeping a super secret notebook the only way to keep track?

who is this guy?
one of the alcoholics from r9k?

You can use any old notebook but I got this notebook made for passwords, super fucking handy. Well organized and has pages for your router, ISP, modem, everything too.

Kinda fucked if I lose it but I don't lose shit so not worried.

Attached: passwords.png (1351x519, 172K)

Seems worse than having an unsecure password. What happens when a thief breaks into your house and finds that book, then gains login info for everything allowing them to steal your identity

>keeping a notebook with all your passwords
Fucking retarded. Just use a a strong template password that's at least 15 characters long and includes special characters and just take the name of the website, make a code for example a -> b, c -> d ... z -> a and put the encoded website names at the end of the password. Unlimited unique uncrackable passwords that only get used on one website and are easy to remember for you.

It's a small indiscreet notebook (that red cover isn't on it) that sits in a cubby on top of notebooks beside my desk. I'd be shocked if they actually took it. Also 0% chance of burglary in my house desu

I'd rather not have to solve an enigma every time I want to access some site.

It looks like wagamama dota streamer

I just have a standard password that has the actual site/service in it

>easy letter shifting code that you can memorize in minutes
>enigma
I think you're better of with the notebook.

I don't use my real name, real email, and my password is a randomly generated 30 character string.

So they got nothing.

keepass.info

It's an offline password storage program unlike those shady as fuck online ones which can be hacked also.

Just use a randomly generated password and make your life easier. Your shit is both too complicated AND easy to crack. It also won't help if the hash is broken or your password is short enough that they can run it against rainbow tables.

>offline password storage program
How is that different from me just using a .txt file on my PC.

Fuck, why does this happen so often? I swear every 2-3 months a company gets their database compromised.

I do something similar, kind of a tier system for a total of 4 passwords.

>Tier 1 - Email
>Tier 2 - Banking
>Tier 3 - General sites
>Tier 4 - Shady/Throwaway sites

All tiers share a few characters, so it's pretty easy to remember. But when something like this happens, I end up changing not only all my passwords, but my "template" across all tiers too.

jump into the digital age, geez grandpa

Attached: Screenshot_20180119_040539.png (1053x500, 264K)

This is specially bad for those people that use the same password on all their sites and mail

>just remember ONE password
1 too many for me.

It's different in a couple of ways:
1) It will generate passwords according to your specifications (some sites dont allow special characters, etc)
2) It can auto-type them into the website
3) It's password protected so if somebody gets the file, they don't have all your passwords
4) It clears the password from keyboard after 15 seconds so you don't accidentally paste it somewhere else

More features are here: keepass.info/features.html. You're still fucked if somebody gets access to your system and can place malware, but there's nothing a password program can do to protect against that.

Attached: file.png (1110x1243, 393K)

>easy to crack
How?
>It also won't help if the hash is broken
All your passwords are different, how is this relevant?
>or your password is short enough that they can run it against rainbow tables
If the base password is already 15 or 20 characters long, the added encrypted name of the website will put it in the 20+ region which is way to long for rainbow tables.

>How?
If someone is targeting you and has your data from multiple breaches, the likelihood increases that they can break the server side hash and detect the cipher. Caesar ciphers are probably the easiest to crack. Once you get one site, you have all your passwords on sites because the cipher is the same.

>All your passwords are different, how is this relevant?
The base password is irrelevant. Once one site is cracked (likely through poor server site security), all of your passwords are cracked because of what I said above.

>If someone is targeting you
If someone is targeting you, stealing a notebook is way easier than breaching multiple platforms only to extract your password and come up with the fact that you used ceasar ciphers for the last part of it. This ain't some fucking detective movie and even if it was, yours still would be less safe.

he is the guy advocating this , not notebook bro (me)

Alright, yeah, that's probably safer.

But that brings up a whole new issue. If your hard drive gets fucked and you lose all your passwords you won't be able to log in anywhere. If you're unlucky enough to not remember your e-mail login, you won't even be able to resent any passwords. It's not safety related though, if you keep it in mind, only amnesia could fuck you over and you already know your base password from probably typing it thousands of times.

Also, if they get their hand on the hard drive, it's pretty easy to get all the information they want. Still assuming the you specifically getting targeted.

All hail the notebook!

I'm not notebook guy. I'm keepass guy. Also I'm strictly talking about online people. If somebody has physical access to your computer, it doesn't really matter what security system you have in place. Malware, hardware keyloggers, etc will defeat most things that a consumer can protect against.

That's why having it password protected rather than in plaintext is so important. You can keep it on a flash drive and put it in your home safe and bank safety deposit boxes (you do have these, right?) and restore from the backup if necessary without worrying about some chucklefuck getting their hands on it and having all your passwords.

I also have it set to backup to my secondary hard drive as soon as I save the file, so if the HDD fails, it only takes seconds to restore that.

Physical access to a system = game over. Even if you were doing your method, they would still be able to get a keylogger to record everything you're doing.

The password database is encrypted.
you need to remember only the database password. You lose it, you lose all your password. Somebody gets a copy of the database and finds the password, gets all.
I use it for simplicity, long complex passwords that i will never remember and keep backups. You can secure the database with another key file present in a removable drive, for example.

>tfw the infamous hacker Jow Forums knows about my broccoli intake

Attached: 1520358807336.png (287x361, 194K)

incase you're browsing, Xiao, I had that burrito and regular cheeseburger because I had a really good workout followed by cardio.

one can guess your password and if they use bad encryption they could see that their guess matches your password. i already changed all my passwords.
sucks though that my email and full name is up for grabs now

Ok, so what if now I start using keepass and sometimes I want to access a website, with keepass generated password, from mobile device because I'm not at home?

>using your real name for anything that doesn't require SSN verification
>not using random passwords with a password manager
>not using an email provider that supports spam filters

What do you do if you're away from home and urgently need to access a website?

I honestly don't think anyone can do anything with my email, name and password except sign me up for spam emails.