this post was submitted on 18 Jan 2024
203 points (98.6% liked)

Privacy

31982 readers
457 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

top 35 comments
sorted by: hot top controversial new old
[–] henfredemars@infosec.pub 79 points 10 months ago (1 children)

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

[–] SexyPolariton@feddit.de 48 points 10 months ago (2 children)

And unique email-aliases for bonus points

[–] Narwhalrus@lemmy.world 12 points 10 months ago (6 children)

Remind me how to do this, please. I always forget this part...

[–] ioslife@lemmy.ml 17 points 10 months ago (1 children)

SimpleLogin and Addy.io are a good start

[–] ebits21@lemmy.ca 5 points 10 months ago

You can integrate this with Bitwarden to auto generate email aliases too

[–] adamkempenich@lemmy.world 10 points 10 months ago (3 children)

For Gmail users, you can add a plus sign to the end of your email username, and then any set of characters you’d like.

So if your address was FakeAddressDoNotUse@gmail.com, and wanted an easy-to-remember login for Hot Dog Hut, you could append it in the following way:

FakeAddressDoNotUse+HotDogHut@gmail.com

[–] BolexForSoup@kbin.social 16 points 10 months ago* (last edited 10 months ago)

Step 1: drop gmail

Step 2: get proton mail and activate simple login or use one of the alias slots they give you (or both!). Enjoy.

Optional step 3: Use Firefox relay on top if you really want to go wild but I find this gets folks turned around when layered on top as well. Great for burner/1-time use emails though.b

[–] seathru@lemm.ee 3 points 10 months ago (1 children)

That used to be my go-to method but I found it works less and less. Places know the gmail tricks and auto-strip them out of the address.

Started using Proton's Hide-my-email and never going back. It's time to move away from google anyways.

[–] Tangent5280@lemmy.world 2 points 10 months ago

Many privacy centric mail companies now offer email aliases and temporary mail ids in built.

[–] EmbeddedEntropy@lemmy.ml 1 points 10 months ago

I used to use that approach, but found in the last several years more than half the web sites I use reject email addresses with “+” characters.

I even use several sites that used to take those addresses just fine now reject them. That made me wonder if some common JS package for parsing email addresses got changed.

[–] Bocky@lemmy.world 6 points 10 months ago

Duck.com is what I use, I generate a unique email for every website. I even started changing my old logins recently for old accounts

[–] trevor@lemmy.blahaj.zone 2 points 10 months ago

I agree with doing this, but the main drawback is that you can't easily check all of your unique aliases in HaveIBeenPwned without scripting something and paying for API access.

I have hundreds of unique aliases for my accounts, but no simple way to see when/if the services that use them are breached.

[–] seathru@lemm.ee 1 points 10 months ago

The free version of Proton Pass is a decent option.

[–] Kbin_space_program@kbin.social 0 points 10 months ago (1 children)
[–] taladar@sh.itjust.works 3 points 10 months ago (1 children)

That is not a standard mail feature, it won't work with all mail servers and not all that do have it use + as the separator.

[–] xor@lemmy.blahaj.zone 0 points 10 months ago

While it's not formalised in the email specs, support for it is pretty consistent, and only needs to work for whichever provider you use

[–] Sir_Kevin@lemmy.dbzer0.com 10 points 10 months ago

I always get funny looks when in person and I give my email address as YourCompanyName@MyDomain.com

I used to explain the how's and the why's but now I just say I'm a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.

[–] gregorum@lemm.ee 15 points 10 months ago (1 children)

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

[–] PM_Your_Nudes_Please@lemmy.world 14 points 10 months ago

Take the opportunity to switch to a password manager, which will allow for unique passwords.

[–] dez@lemmy.ml 8 points 10 months ago

One more thing to say to me to speed up changing my services related to gmail and delete it forever.

[–] swampdownloader@lemmy.dbzer0.com 5 points 10 months ago* (last edited 10 months ago) (3 children)

So how do we access the list to see what got out?

Edit: https://search.0t.rocks/ has the db

[–] camr_on@lemmy.world 10 points 10 months ago (1 children)
[–] deweydecibel@lemmy.world 3 points 10 months ago

Why on earth should people trust that site?

[–] Pika@sh.itjust.works 2 points 10 months ago* (last edited 10 months ago)

What's more insane is that some of those passwords in the lists are I still live intrusions that companies haven't acted on, like for example my Dropbox password is there and that's a new password that I just gave them a few months ago before I deleted my account

[–] chaosppe@lemmy.world 3 points 10 months ago (1 children)

I've checked the list on mine, those are some really really old passwords.. Must've been a long time ago.

[–] bfg9k@lemmy.world 2 points 10 months ago (2 children)

How were you able to search the list? I can't find it anywhere

[–] Bizarroland@kbin.social 4 points 10 months ago

Just tell me your username and password and I'll tell you if you've been hacked

[–] chaosppe@lemmy.world 1 points 10 months ago* (last edited 10 months ago) (1 children)
[–] bfg9k@lemmy.world 2 points 10 months ago

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

[–] Knuschberkeks@feddit.de 3 points 10 months ago (1 children)

Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search https://search.0t.rocks/ for my email it comes up empty.