305
all 23 comments
sorted by: hot top controversial new old
[-] JaymesRS@literature.cafe 75 points 1 year ago

That’s why I only use “hunter2” for mine. With the number, it’s more secure.

[-] laurelraven 50 points 1 year ago

Just looks like a bunch of stars to me

[-] TimeSquirrel@kbin.social 35 points 1 year ago

40 years from now when our devices just encode encrypted keys into our brains directly to identify us, we'll still be making this joke.

[-] Steak@lemmy.ca 11 points 1 year ago

40 years from now and I will finally be hunter2. My dream.

[-] billwashere@lemmy.world 7 points 1 year ago

Hey that’s my password!! Get outta my head.

[-] theherk@lemmy.world 9 points 1 year ago* (last edited 1 year ago)

Damn skippy; as we put on our robes and wizard hats.

—-

OMG! Days after I made this post it seems bash.org is no more. End of an era.

[-] eronth@lemmy.world 5 points 1 year ago

I think we'll have moved on to hunter3 by then.

[-] sawdustprophet@midwest.social 27 points 1 year ago

That’s why I only use “*******” for mine. With the number, it’s more secure.

I guess it works because I can't see the password.

[-] remus989@sh.itjust.works 10 points 1 year ago

Nah, you need more numbers in your passwords. That's why mine is always 123456789!

[-] tigerjerusalem@lemmy.world 2 points 1 year ago

That's it, I'm going to use hunter123456789 now for maximum security!

[-] yuki2501@lemmy.world 39 points 1 year ago

His password may be ripeadmin, but that admin looked pretty green to me.

[-] Shadow@lemmy.ca 33 points 1 year ago* (last edited 1 year ago)

In a post, the security firm said the username and “ridiculously weak” password were harvested by information-stealing malware that had been installed on an Orange computer since September.

So the password being weak was actually irrelevant here, even if it was 32 random characters they would have pulled it off that pc.

[-] cley_faye@lemmy.world 7 points 1 year ago

Depending on the attack vector it could also have pulled it out of other things, but that's exactly why we have 2FA. And I mean real 2FA, on two different channels, that should be harder to compromise simultaneously.

[-] FartsWithAnAccent@lemmy.world 31 points 1 year ago

H A C K E R M A N

[-] AdamEatsAss@lemmy.world 19 points 1 year ago

A far more secure password would have been RipeAdmin1$. Gotta get those capitals, lowercases, numbers, and special characters.

[-] moistclump@lemmy.world 4 points 1 year ago

Passphrases 14+ characters with upper and lower case, numbers, special characters. Such as r1peAsAm@ang0adm1n!

At least that’s what John Oliver and Ed Snowden say. I trust Ed on this one.

[-] theherk@lemmy.world 10 points 1 year ago

Each added character adds much more entropy than character class. Password Strength

[-] billwashere@lemmy.world 3 points 1 year ago

It should be

r!p3adm!n

[-] stardreamer 6 points 1 year ago

according to a detailed writeup of the event by Doug Madory, a BGP expert at security and networking firm Kentik.

What's a ”BGP expert”? Most of this stuff is covered in an undergraduate networking course. Wouldn't just "networking expert" do?

[-] autotldr@lemmings.world 3 points 1 year ago

This is the best summary I could come up with:


Orange España, Spain’s second-biggest mobile operator, suffered a major outage on Wednesday after an unknown party obtained a “ridiculously weak” password and used it to access an account for managing the global routing table that controls which networks deliver the company's Internet traffic, researchers said.

The password came to light after the party, using the moniker Snow, posted an image to social media that showed the orange.es email address associated with the RIPE account.

In a post, the security firm said the username and “ridiculously weak” password were harvested by information-stealing malware that had been installed on an Orange computer since September.

Once logged into Orange’s RIPE account, Snow made changes to the global routing table the mobile operator relies on to specify what backbone providers are authorized to carry its traffic to various parts of the world.

All but one of them also originated with the Orange AS, and once again had no effect on traffic, according to a detailed writeup of the event by Doug Madory, a BGP expert at security and networking firm Kentik.

The creation of the ROA for 149.74.0.0/16 was the first act by Snow to create problems, because the maximum prefix length was set to 16, rendering any smaller routes using the address range invalid


The original article contains 516 words, the summary contains 211 words. Saved 59%. I'm a bot and I'm open source!

[-] macaroni1556@lemmy.ca 1 points 1 year ago
this post was submitted on 06 Jan 2024
305 points (100.0% liked)

Technology

68599 readers
4188 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS