[153822] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: LinkedIn password database compromised

daemon@ATHENA.MIT.EDU (Grant Ridder)
Wed Jun 13 15:56:07 2012

In-Reply-To: <4FD8D670.8010800@psu.edu>
Date: Wed, 13 Jun 2012 14:54:59 -0500
From: Grant Ridder <shortdudey123@gmail.com>
To: Phil Pishioneri <pgp+nanog@psu.edu>
Cc: "Aaron C. de Bruyn" <aaron@heyaaron.com>, Nanog <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Hi Everyone,

I thought that i would share an IEEE article about LinkenIn and eHarmony.

http://spectrum.ieee.org/riskfactor/telecom/security/linkedin-and-eharmony-hacked-8-million-passwords-taken/?utm_source=computerwise&utm_medium=email&utm_campaign=061312


-Grant

On Wed, Jun 13, 2012 at 1:05 PM, Phil Pishioneri <pgp+nanog@psu.edu> wrote:

> On 6/8/12 7:22 PM, Luke S. Crawford wrote:
>
>> I haven't found any way that is as simple and as portable as using
>> ssh that works in a web browser.
>>
>
> The Enigform Firefox Add-on (plus mod_openpgp on Apache httpd) seems
> similar:
>
> http://wordpress.org/extend/**plugins/wp-enigform-**authentication/<http://wordpress.org/extend/plugins/wp-enigform-authentication/>
>
>  Enigform is a Firefox Add-On which uses OpenPGP to digitally sign
>> outgoing HTTP requests and Securely login to remote web sites, as long
>> as the remote web server is Enigform-compliant.
>>
>
> -Phil
>
>

home help back first fref pref prev next nref lref last post