Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <lfbb7oFhto3U1@mid.individual.net>
Deutsch   English   Français   Italiano  
<lfbb7oFhto3U1@mid.individual.net>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: Jolly Roger <jollyroger@pobox.com>
Newsgroups: comp.sys.mac.system
Subject: Re: RockYou2024 leak of 10 billion passwords - the biggest password
 leak ever
Date: 12 Jul 2024 00:21:12 GMT
Organization: People for the Ethical Treatment of Pirates
Lines: 50
Message-ID: <lfbb7oFhto3U1@mid.individual.net>
References: <v6cjud$1sp0$1@nnrp.usenet.blueworldhosting.com>
 <v6pek0$2k746$1@dont-email.me> <z7_jO.37974$SLqf.16597@fx15.iad>
X-Trace: individual.net 0tTlehsurhUQoJAmmhMW2Qyer1kRzm+Sa16DFaUKg4xciqS8uH
Cancel-Lock: sha1:/T51IxcxMlnK4sLQctxG9MGQT4k= sha256:VJ036cv/r3kOSzI8Wqrsff5gif9rZUwJlF4LY0DMSuA=
Mail-Copies-To: nobody
X-Face: _.g>n!a$f3/H3jA]>9pN55*5<`}Tud57>1<n@LQ!aZ7vLO_nWbK~@T'XIS0,oAJcU.qLM
 dk/j8Udo?O"o9B9Jyx+ez2:B<nx(k3EdHnTvB]'eoVaR495,Rv~/vPa[e^JI+^h5Zk*i`Q;ezqDW<
 ZFs6kmAJWZjOH\8[$$7jm,Ogw3C_%QM'|H6nygNGhhl+@}n30Nz(^vWo@h>Y%b|b-Y~()~\t,LZ3e
 up1/bO{=-)
User-Agent: slrn/1.0.3 (Darwin)
Bytes: 3254

On 2024-07-11, Alan Browne <bitbucket@blackhole.com> wrote:
> On 2024-07-11 16:17, Fishrrman wrote:
>> On 7/6/24 7:28 PM, Mickey D wrote:
>>> Cybernews researchers discovered what appears to be the largest
>>> password compilation with a staggering 9,948,575,739 unique
>>> plaintext passwords. The file with the data, titled rockyou2024.txt,
>>> was posted on July 4th by forum user ObamaCare.
>> 
>> I'm currently experimenting with Apple's new OS 15 "Sequoia" on an
>> external SSD.
>> 
>> One of the new features of this release will be the Apple "Passwords"
>> app.
>> 
>> Although (up to this point) I've kept all my passwords in a
>> self-created database, I opened Passwords to see what it was like.
>> 
>> It had already compiled a list of passwords that I'd been using on
>> the experimental Sequoia SSD.
>> 
>> But one feature that looked welcome was...  ... it identified two of
>> my passwords that may have recently been "compromised". It looks like
>> the Passwords app is reaching into some "resevoir" of
>> "known-compromised" passwords, or perhaps even Apple has acquired
>> some of these giant purloined password files.
>> 
>> In any case, it lets you know if specific passwords you're using may
>> be compromised...
>
> Good thing.
>
> I DL'd an earlier RockYou and exported my passwords from 1Password to
> a flatfile (.txt).  The obtuse 1Password text file format (clearly
> "evolved over time" <cough>) took some time to code for.  This program
> searched all my passwords against the RockYou file.  One showed up.  A
> complex password that some company generously leaked to the world once
> upon a time.  While I had changed the password on the site I hadn't
> flushed the backup of it from 1P and it was in the 1P file... since
> abandoned that co. but a copy of that pw is forever in Rockyou
> variants.

The current version of rockyou2024.txt is here, for anyone interested:

magnet:?xt=urn:btih:4e3915a8ecf6bc174687533d93975b1ff0bde38a

-- 
E-mail sent to this address may be devoured by my ravenous SPAM filter.
I often ignore posts from Google. Use a real news client instead.

JR