[153630] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Dear Linkedin,

daemon@ATHENA.MIT.EDU (Terje Bless)
Sat Jun 9 07:29:51 2012

In-Reply-To: <4FD25716.3000801@mtcc.com>
From: Terje Bless <link@pobox.com>
Date: Sat, 9 Jun 2012 13:29:18 +0200
To: NANOG list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Fri, Jun 8, 2012 at 9:48 PM, Michael Thomas <mike@mtcc.com> wrote:
> Linkedin has a blog post that ends with this sage advice:

The sagest of which is to ask you to change your password on LinkedIn
itself, *before* actually plugging the hole that led to the passwords
leaking in the first place. Almost as sagely, they're only
invalidating the passwords positively identified as having leaked,
rather than assume all have, despite several security researchers
concluding that the passwords that were posted publically were only a
subset of those that were stolen.

-link


home help back first fref pref prev next nref lref last post