On 8 June 2012 12:31, Reinier Battenberg <[email protected] > wrote:
> > that what the code does, is create a hash of your password, that hash is > then > sent to the server and checked against all the leaked hashes. > > so, no matter what you put into the box, the only thing they do at > leakedin.org is check if they already have what you submit. > > the code shows, they dont see your password, just the hash. > > Well, they could easily be collecting your hash and adding it to their list, (and marking it as genuine) for future use. If they actually do have the email addresses as well, then you've just made the hackers' work a lot easier.
_______________________________________________ The Uganda Linux User Group: http://linux.or.ug Send messages to this mailing list by addressing e-mails to: [email protected] Mailing list archives: http://www.mail-archive.com/[email protected]/ Mailing list settings: http://kym.net/mailman/listinfo/lug To unsubscribe: http://kym.net/mailman/options/lug The Uganda LUG mailing list is generously hosted by INFOCOM: http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The mailing list host is not responsible for them in any way.
