On 8 June 2012 12:31, Reinier Battenberg <[email protected]
> wrote:

>
> that what the code does, is create a hash of your password, that hash is
> then
> sent to the server and checked against all the leaked hashes.
>
> so, no matter what you put into the box, the only thing they do at
> leakedin.org is check if they already have what you submit.
>
> the code shows, they dont see your password, just the hash.
>
>
Well, they could easily be collecting your hash and adding it to their
list, (and marking it as genuine) for future use. If they actually do have
the email addresses as well, then you've just made the hackers' work a lot
easier.
_______________________________________________
The Uganda Linux User Group: http://linux.or.ug

Send messages to this mailing list by addressing e-mails to: [email protected]
Mailing list archives: http://www.mail-archive.com/[email protected]/
Mailing list settings: http://kym.net/mailman/listinfo/lug
To unsubscribe: http://kym.net/mailman/options/lug

The Uganda LUG mailing list is generously hosted by INFOCOM: 
http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The mailing list host is not responsible for them in any 
way.

Reply via email to