[153482] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (Marshall Eubanks)
Thu Jun 7 12:12:44 2012

In-Reply-To: <DF4AE35E-66AE-4EAD-87C9-C11836A52B28@puck.nether.net>
Date: Thu, 7 Jun 2012 12:12:02 -0400
From: Marshall Eubanks <marshall.eubanks@gmail.com>
To: Jared Mauch <jared@puck.nether.net>
Cc: "Aaron C. de Bruyn" <aaron@heyaaron.com>, Nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Jun 7, 2012 at 11:58 AM, Jared Mauch <jared@puck.nether.net> wrote:
>
> On Jun 7, 2012, at 2:14 AM, Aaron C. de Bruyn wrote:
>
>> Imaging signing up for a site by putting in your email and pasting
>> your public key.
>>
>
> I'm imagining my mother trying this, or trying to help her change it after the hard drive dies and the media in the safe deposit box doesn't read anymore.

Or having to deal with family tech support, along the lines of

"You said you pasted it exactly."

"But I did. I've spent hours trying to watch that movie. I don't know
why it isn't working."

"But you {added a period at the end / didn't include the  line wrap /
added a space at the beginning / etc}"

"Oh. Does that matter"

For more joy, imagine debugging such issues over the phone. At least I
can say that my Mother (God rest her soul) would never
have indulged in such foolery. She would have just called the company
to send a technician in to send the email for her.

Regards
Marshall


home help back first fref pref prev next nref lref last post