Message boards : Questions and problems : Data breach notification on Boinc.berkley.edu?
Message board moderation
Author | Message |
---|---|
Send message Joined: 8 Nov 19 Posts: 718 ![]() |
Google Chrome notified me that this forum has experienced a data breach (password breach) on this site. This notification popped up on the top center of my page: ![]() I don't care much, as the person will probably be able to impersonate me at best. This password isn't a high priority password... But still, perhaps good to know for some people... |
![]() ![]() Send message Joined: 29 Aug 05 Posts: 15642 ![]() |
Firstly, it does not matter on which website you see this new warning. The new message is a warning about the username/email and password combination that you just entered. That combination has been compromised in a breach of a website/app. What that actually means is you need to change your password on all websites/apps where you are using the same username/email and password combination.https://support.google.com/chrome/thread/23534509?hl=en Iow, it's the email address/password combination you used that has been compromised, somewhere, not necessarily here. |
Send message Joined: 8 Nov 19 Posts: 718 ![]() |
Firstly, it does not matter on which website you see this new warning. The new message is a warning about the username/email and password combination that you just entered. That combination has been compromised in a breach of a website/app. What that actually means is you need to change your password on all websites/apps where you are using the same username/email and password combination.https://support.google.com/chrome/thread/23534509?hl=en Thanks! I first saw it on Boinc forums. I knew for 4 months, my password was compromised, as i got scam mails in my inbox, extorting me into showing what I did, if I didn't return the email; but I don't really care (haven't done anything worth spreading). They don't know I have different levels of passwords, and the password they got, was the lowest level, mainly forum passwords. 😆 |
![]() ![]() Send message Joined: 27 Jun 08 Posts: 642 ![]() |
I have never seen that pic nor was I even aware of this capability. I do use chrome for first visits or searching as I have chrome locked down. My other browser is Edge. I don't like it but it does work better on forms mainly because I keep chrome on tight leash. Sometimes chrome wont even show a required "captcha" popup because I loaded it with so many blocking extensions. [edit] Thanks for letting me correct this post. |
![]() ![]() Send message Joined: 29 Aug 05 Posts: 15642 ![]() |
Because they have a database with 4 billion combinations in them to check against. Which is nothing, when compared to the other freely available checkup https://haveibeenpwned.com/ |
![]() ![]() Send message Joined: 23 Feb 08 Posts: 2516 ![]() |
Because they have a database with 4 billion combinations in them to check against. Which is nothing, when compared to the other freely available checkup https://haveibeenpwned.com/ It is called a one way hash and salt. Math. You put in a number, your password converted to a number, and it spits out a different number. Done right there is no way to put the result number in and backtrack to the password. Hackers get the hash file and brute force build up what each password was. And I assume the Google one is better, as I assume it's checking the email address AND password, whereas your link only checks the email address. It said I had been compromised, but it didn't tell me what password was used, so I have no idea if I have to change it again or not. I can't remember the password used on the site it mentioned, as I haven't used it for ages. I have identity theft protection - free from a possibly breached company - and they give me a report saying one of mine was stolen in a breach from Adobe Systems. I don't know of a free site that will backtrack to the particular breach. What the hackers do is once they find a live user/pass combination they take the combination and try it on dozens of popular sites. So it if was for @aol they will try @yahoo, @gmail, @facebook, @twitter, @banks ... but they wont try @boinc. |
![]() ![]() Send message Joined: 23 Feb 08 Posts: 2516 ![]() |
Can't stop brute force. They start with A, B, C ... AA, AB ... until they get tired. Now they have a table with billions of original passwords and the hashed passwords. Look up in the table for the hash and get the original. The salt is the thing that makes this somewhat secure. Each system should have a different salt, so that if you break one (build the table) you can't use it on any other system. That's one of the parts about doing it correctly. As to computer power, if you are the CIA or NSA you have multiple computer clusters each more powerful than all of BOINC put together. May take them a while to break, but they will. Your defense is to change passwords frequently so that they can't get to you in real time. |
Send message Joined: 8 Nov 19 Posts: 718 ![]() |
Back in the windows nt days, we were able to crack 12 digit passwords in a matter of minutes, on older hardware (Pentium 166Mhz), with a DVD containing 3-4Gb of passwords (rainbow tables). If back then it took only 2 minutes to crack a password, it'll take mere few seconds to crack them using 4000+ core GPUs. Also, the generation of 2-4 GB of rainbow tables took nearly a year. With current hardware, and an optimized algorithm, 100GB Blu-ray discs filled with rainbow tables can be generated in the same amount of time. Meaning, once the table is out in the open, even 15 digit passwords containing asci characters (letters, numbers, capital letters, symbols and spaces), can be hacked in a matter of minutes. |
Send message Joined: 8 Nov 19 Posts: 718 ![]() |
Because they have a database with 4 billion combinations in them to check against. Which is nothing, when compared to the other freely available checkup https://haveibeenpwned.com/ I received the same mail a few months ago. I never responded. Instead, I get an influx of 100 spam mails per day. Thankfully, only a few ever hit my inbox. I don't even bother reading the spam mail of my junk email account. LOL! Really important info, gets stored in another email. So I know I'm not missing out on anything. People are really dumb, if they think they can bother me. Oh, and if they impersonate me, I'll just log in with another email. It's not that I absolutely HAVE to have the username 'ProDigit' everywhere. It's just an online name I use since 1998. But I have other aliases I can easily take on. It pays to be Internet savvy! |
![]() ![]() Send message Joined: 23 Feb 08 Posts: 2516 ![]() |
Back in the windows nt days, we were able to crack 12 digit passwords in a matter of minutes, on older hardware (Pentium 166Mhz), with a DVD containing 3-4Gb of passwords (rainbow tables). Nope. It just requires you to know the way the passwords are hashed (system function - same across nearly all systems) and access to the hashed passwords. This is the brute force method I was describing earlier. You don't have to make attempts until you guess the right one, you simply look up the right one and make one successful attempt. This is why "salt" is so important. It makes the rainbow table useless because it makes the way the passwords are hashed unique to that computer. So now an attacker also has to work out what the salt was before he can generate his rainbow table. Unfortunately soo may people use "password" and "123456" and the like as passwords, once you guess a salt and those pop out, you have decoded the entire master password list. It isn't hard anymore. |
![]() Send message Joined: 28 Jun 10 Posts: 2873 ![]() |
I do know one of my older passwords was found out from somewhere, because I occasionally get requests by email for me to pay somebody a few grand in bitcoins so they don't tell the world I watch porn or something. And they quote a password I used several years ago. Got one of those a couple of months ago, purporting to be sent from my own email. However using thunderbird, I clicked on More>view source and found it actually originated from an email address in Poland so I assume my hardware porn viewing habits are safe and other half doesn't know I have been looking at Ryzens. |
Send message Joined: 1 Feb 20 Posts: 1 ![]() |
Firstly, it does not matter on which website you see this new warning. The new message is a warning about the username/email and password combination that you just entered. That combination has been compromised in a breach of a website/app. What that actually means is you need to change your password on all websites/apps where you are using the same username/email and password combination.https://support.google.com/chrome/thread/23534509?hl=en |
![]() Send message Joined: 28 Jun 10 Posts: 2873 ![]() |
Looking at the link in the last post, I see that some people are still getting the warning even after they changed their passwords. Not quite sure what this means. |
Copyright © 2025 University of California.
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License,
Version 1.2 or any later version published by the Free Software Foundation.