[153491] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (Marshall Eubanks)
Thu Jun 7 13:34:50 2012

In-Reply-To: <CACg3zYGhy2Jc-1jij4rYuoEvLaJpNiWyi6Jb14ZG38B9mms_ow@mail.gmail.com>
Date: Thu, 7 Jun 2012 13:33:59 -0400
From: Marshall Eubanks <marshall.eubanks@gmail.com>
To: Tei <oscar.vives@gmail.com>
Cc: North American Network Operators' Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Thu, Jun 7, 2012 at 1:30 PM, Tei <oscar.vives@gmail.com> wrote:
> The problem:
> - Modern internet users must have lots of different login/passwords aroun=
d
> the internet. =C2=A0Most of then in easy-to-break poorly-patched poorly-m=
anaged
> servers, =C2=A0like linkedin.
>
> The solution:
> - =C2=A0Reduce the number of authentication. =C2=A0Allow anonymous postin=
g in more
> sites.
>
> Imagine this. =C2=A0 I post something on the blog =C2=A0"yadaydayda". I g=
ive my email
> and nothing else. =C2=A0 The blog software sends me a email to confirm th=
e post.
> I click on it, and the post is published.
>
> The real problem is that nowdays everybody and his dog want a password, a=
nd
> a password is expensive for the user. =C2=A0The internet need more anonym=
ous
> ways to publish content.

Maybe so, but anonymous entries on linkedin seems like a zen koan,
beyond the powers of my simple mind.

Regards
Marshall

>
>
> --
> --
> =E2=84=B1in del =E2=84=B3ensaje.


home help back first fref pref prev next nref lref last post