Cutout.Pro, an AI-powered visual design platform, leaked 20M records, including email and IP addresses, names and salted MD5 password hashes, which have then been broadly distributed.

Squire1039@lemm.ee to Technology@lemmy.world – 110 points –
Have I Been Pwned: Pwned websites
haveibeenpwned.com

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site.

Other links on the story:

10

You are viewing a single comment

Why do people humble brag about their password strength, but then tell the whole world how to construct rainbow tables designed to crack their passwords?

Iirc rainbow tables are currently useless due to good seasoning salt.

Though password crackers can take a known pattern to drastically increase speed it would still have to do the whole calculation for every password.

Like I mentioned, I'm using a related pattern, nothing as simple as the one I sketched out here.

As long as the other 18 characters are randomly generated that seems secure enough, and a decent way to keep track of which passwords are associated with which accounts.

Feels like just a roundabout an exceptionally more difficult way to achieve a strong password versus just a password manager. Where you can do ridiculous things like have a 100 character long password

Only to discover that the website will accept 100 characters in the box but actually truncate it to like 40 without telling you