Cutout.Pro, an AI-powered visual design platform, leaked 20M records, including email and IP addresses, names and salted MD5 password hashes, which have then been broadly distributed.

Squire1039@lemm.ee to Technology@lemmy.world – 110 points –
Have I Been Pwned: Pwned websites
haveibeenpwned.com

Haha, brand new company with MD5 password hashes. Maybe they oughta consult about securities with their/other AIs more often. Hopefully, nobody did anything naughty on the site.

Other links on the story:

10

It's a good thing not just everybody can afford a raspberry pi zero that would be necessary to crack an MD5 in seconds

That really depends on the password complexity. Sure, you can crack a password of 6-8 characters in below 30 minutes, but anything more complex than that will take days and longer.

My default password is 22 characters long and includes a unique identifier for each service plus a checksum. Say as an example (similar enough to my actual use case) for Adobe I'll have "Ae" (first and last letter of the service) and "41" in a specific position (A = 41 in Hex).

That way even if I repeat the other 18 characters (including symbols, upper and lower case characters) it will take years or even decades on a consumer grade system to crack my password, and the hash is unique for each service/website, so there won't be any collateral damage either, even if some service I used got breached and my password somehow fully exposed.

Why do people humble brag about their password strength, but then tell the whole world how to construct rainbow tables designed to crack their passwords?

Iirc rainbow tables are currently useless due to good seasoning salt.

Though password crackers can take a known pattern to drastically increase speed it would still have to do the whole calculation for every password.

Like I mentioned, I'm using a related pattern, nothing as simple as the one I sketched out here.

As long as the other 18 characters are randomly generated that seems secure enough, and a decent way to keep track of which passwords are associated with which accounts.

Feels like just a roundabout an exceptionally more difficult way to achieve a strong password versus just a password manager. Where you can do ridiculous things like have a 100 character long password

Only to discover that the website will accept 100 characters in the box but actually truncate it to like 40 without telling you

I think I'll stick with a password manager and its randomly generated passwords instead of doing an algebra problem every time I want to check my email

I guess then "hunter2" users are in trouble.