[153464] in North American Network Operators' Group
Re: LinkedIn password database compromised
daemon@ATHENA.MIT.EDU (Aaron C. de Bruyn)
Wed Jun 6 22:44:48 2012
In-Reply-To: <CAJNg7V+HFuXeDN7s8EoGX=LXhH1ePLEk88n8uPWyNCSU2KjD7A@mail.gmail.com>
From: "Aaron C. de Bruyn" <aaron@heyaaron.com>
Date: Wed, 6 Jun 2012 19:43:42 -0700
To: Marshall Eubanks <marshall.eubanks@gmail.com>
Cc: Nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Wed, Jun 6, 2012 at 7:19 PM, Marshall Eubanks
<marshall.eubanks@gmail.com> wrote:
> On Wed, Jun 6, 2012 at 9:33 PM, Lynda <shrdlu@deaddrop.org> wrote:
>> In other words, if you have a LinkedIn account, expect that the password has
>> been stolen. Go change your password now. If you used that password
>> elsewhere, you know the routine. In addition, as has been pointed out
>> elsewhere, there's no sign LI has fixed the problem. Expect that the
>> password you change it to will also be compromised.
Why haven't we taken this out of the hands of website operators yet?
Why can't I use my ssh-agent to sign in to a website just like I do
for about hundred servers, workstations, and my PCs at home?
One local password used everywhere that can't be compromised through
website stupidity...
-A