I think the part of this that I don't understand is that... I'd thought that if you can get deterministic results about password compromise by comparing only hashes then those hashes are either unsalted or otherwise being mishandled at some step in the process.
I also didn't think that "unrelated accounts used by unrelated people coincidentally have the same password" is the same as "this password is compromised".
What am I missing?
blog.cloudflare.com/password-r…
blog.cloudflare.com/helping-ke…
Password reuse is rampant: nearly half of observed user logins are compromised
Nearly half of observed login attempts across websites protected by Cloudflare involved leaked credentials. The pervasive issue of password reuse is enabling automated bot attacks and account takeovers on a massive scale.The Cloudflare Blog
Art by Kenyan artist April Kamunde
#aprilkamunde #womenartists #kenyanartist #contemporaryart #kenyanart #africanart #kenya #africa #BlackMastodon #blackstodon
You ever listen to the opening bars of a song and know for a fact that there's a chase scene involving a Chevy Nova in your immediate future?
esq.social/@D_J_Nathanson/1141…
duckduckgo.com/?t=ffab&q=chevy…
David Nathanson (@D_J_Nathanson@esq.social)
#TuneTuesday #HotHotHot Hott Karl is both a great song and also has to be the name of a personal trainer. Orgone - Hott Karl (guitar-heavy funk) https://orgonemusic.bandcamp.com/track/hott-karl-2esq.social
Hands On With Qualcomm's Snapdragon G3 Gen 3 Chip In Ayaneo's Pocket S2
Ayaneo's Pocket S2 ran smoothly with high frame rates without getting hot. The handheld is among the first to use Qualcomm's Snapdragon G3 Gen 3 chip.Michael Kan (PCMag)
Announcing Fedora Linux 42 Beta - Fedora Magazine
The Fedora Project is pleased to announce the availability of Fedora Linux 42 Beta! We have lots of info to share about our upcoming release.Matthew Miller (Fedora Project)
Checking In On the ISA Wars and Its Impact on CPU Architectures
hackaday.com/2025/03/18/checki…
Checking In On The ISA Wars And Its Impact On CPU Architectures
An Instruction Set Architecture (ISA) defines the software interface through which for example a central processor unit (CPU) is controlled. Unlike early computer systems which didn’t define …Hackaday
Bundestag prepares to vote on historic borrowing package in key test for Merz
Likely next chancellor needs two-thirds majority to back €500bn infrastructure fund and relaxation of debt rulesKate Connolly (The Guardian)
Well the display on my fridge is going well.
- Bin collection, polled from council's web site.
- Weather condition from an API
- Temp from my local weather station
- Grid power from Glow meter MQTT posts
- Solar from inverter by MODBUS/TCP
- Sunrise/set.
- DEFCON from FireBrick monitoring which kids are in house using DHCP.
Linux User Space makes videos about the history of various Linux distributions and Linux-related software. You can follow at:
➡️ @linuxuserspace@tilvids.com
There are already 26 videos uploaded, if they haven've federated to your server yet you can browse them all at tilvids.com/a/linuxuserspace/v…
You can also follow their general social media account at @linuxuserspace@mastodon.social
#FeaturedPeerTube #Linux #ComputingHistory #Distros #GNULinux #RetroComputing #PeerTube #PeerTubers
Linux User Space
How did your favorite Linux distribution or tool get its start? Join us and find out!See our normal posts: @linuxuserspace@mastodon.socialLinux User Space is hosted by Leo and Dan, and we like to d...TILvids
#racism over time, while those who opposed him grew more conscious of racial inequalities. An adolescent development scholar explains: theconversation.com/trumps-fir… #politics
Trump’s first term polarized teens’ views on racism and inequality
A social scientist tracking adolescents’ beliefs and behaviors over time was uniquely positioned to document changes in teens’ worldviews after Trump’s 2016 election.The Conversation
With GIMP 3 releasing of course the stupid name arguments start up again, if they want to change it they will, if they don't they won't. A name change won't make the application any more popular, it'll still be GIMP and it'll still be in the same state functionality wise. But it's so much easier to argue about a name than it is to address the hard stuff. Regarding the projects stance have a read of the FAQ gimp.org/docs/userfaq.html#i-d…
This is the last I'm going to say on it, see you in a few years.
GIMP - Frequently Asked Questions
General questions Is there a company or a foundation behind GIMP? Can I use GIMP commercially? What’s the GIMP’s license, and how do I comply with it? Someone sold or tried to sell me GIMP on a 3rd party website.www.gimp.org
Am Freitag kam die Frage auf:
Wie finde ich weitere Accounts zum Folgen?
Die Standardantworten hatte ich gegeben.
Siehe fedi.tips/how-do-i-find-accoun…
Weitere Möglichkeit ist, speziellen 'trending'-bots zu folgen. Ich folge z.B.:
@hypebot und @TrendingBoost
fedihum.org hat trending nicht aktiviert; das geht entweder automatisch oder mit menschliches Kuratieren.
Gegen ersteres hatten wir uns am Anfang entschieden, für letzteres haben wir nicht genug Kapazitäten.
How do I discover accounts to follow on Mastodon and the Fediverse? | Fedi.Tips – An Unofficial Guide to Mastodon and the Fediverse
An unofficial guide to using Mastodon and the Fediversefedi.tips
Colorado and other states have expanded access to abortion, but not for adolescents
Colorado enshrined the right to abortion in its Constitution, but it still requires minors to seek consent from a parent.The Conversation
Last of the classified JFK assassination files to be released Tuesday
https://www.npr.org/2025/03/18/g-s1-54434/jfk-kennedy-assassination-files-classified-documents?utm_source=flipboard&utm_medium=activitypub
Posted into U.S. News @u-s-news-npr
"One of the first types of cyberattacks anyone learns about is the brute force attack. This is a type of hack that relies on rapid trial-and-error to guess a password. ...
The best way to think of the slop and spam that generative AI enables is as a brute force attack on the algorithms that control the internet and which govern how a large segment of the public interprets the nature of reality."
~ Jason Koebler
#AI #SocialMedia #algorithms
/1
404media.co/ai-slop-is-a-brute…
AI Slop Is a Brute Force Attack on the Algorithms That Control Reality
Generative AI spammers are brute forcing the internet, and it is working.Jason Koebler (404 Media)
Well, as long as the GNU-slash-IMP folks are mad at me, I should go for broke and irritate everyone. Someone's got to be debbie downer and I guess today it's me.
Does @gnome support the use of a slur for a project they're hosting? Because from where I sit, they appear to, and I feel like hosting this project might be a violation of their CoC.
why don't they just renamed it "Wilber" after the mascot tbh? It's easy to remember, it doesn't spit in the face of disabled people, they can keep all other branding the same, and it's a fairly unique name, which is a big advantage in a time where the biggest companies in the world are called "Meta" and "Alphabet".
(So long as they ditch the "Wilber is his own species, a gimp" shtick with it. That's a raccoon if ever I saw one.)
Hm. Gnome uses GitLab. So they're probably fine with it, as they also support apps, where the team behind it actively supports DOGE and therefore the Trump administration.
«The problem isn’t that the fediverse isn’t viable. The problem isn’t that it’s “too complicated.” The problem is that the giants of Silicon Valley have spent 20 years convincing us that anything outside their control isn’t worth our time.
And that’s just not bloody true.»
From: The Fediverse Isn’t the Future. It’s the Present We’ve Been Denied.
joanwestenberg.com/the-fediver…
The Fediverse Isn’t the Future. It’s the Present We’ve Been Denied.
For years, the internet has been shrinking. Not in size, not in data, but in ownership. A vast, decentralized network of personal blogs, forums, and independent communities has been corralled into a handful of paved prison yards controlled by a few m…Joan Westenberg (westenberg.)
reshared this
Sometimes if a bird is worth a boop (and let's face it, pretty much all birds are worth a boop) then it's also worth the effort in reaching them, however high up they have decided to perch.
Tune in to our stream for more!
youtube.com/watch?v=s-kPzpYtZl…
The Aquabats! - Poppin' A Wheelie!
A Music Video I made for The Aquabats 3 months ago for fun.Made in FlashMusic by The Aquabats!If you think this song is good, and you would like the CD. ther...YouTube
Sony Launches Dark Outlaw, a First-Party Game Studio Led by Call Of Duty Vet
Dark Outlaw, part of PlayStation Studios, has been working in the shadows for quite some time now, confirms dev Jason Blundell.Jibin Joseph (PCMag)
TIL: That Joseph Campbell is trash, universal myths aren't going to save us but maybe folklore can.
What's your favorite folk lore or public domain story that talks shit about rich people and/or monarchs?
youtube.com/watch?v=Q9zR4lWyVN…
#JosephCampbell #myth #myths #folklore #PublicDomain #CreativeCommons
Is Joseph Campbell's "Hero's Journey" bad actually?? | Part 1 of 2
If you want to directly support me and see this video without ads, check it out at https://nebula.tv/videos/maggiemaefish-the-heros-journey-is-bullstPART 2 o...YouTube
If I can criticize the Brothers Grimm for their anti-Semitism, I can criticize Joseph Campbell for his faults.
Also, what works for Disney movies does not work for all folk storytelling. Heck, the "Monomyth" is utterly inapplicable to the vast majority of German folk tales I have read.
Ah, so it's the amount of _money_ that someone makes that ultimately matters, not whether they are right or wrong?
I suppose that _is_ in the spirit of this time of age.
The Mantis, Samurai Girl by Doriana Dream (Tatiana Pavlov)
#DnD #DungeonsAndDragons #ttrpg #character #characterart #art #digitalart
The image depicts a stylized figure dressed in a vibrant green and red traditional outfit, reminiscent of East Asian attire. The figure is holding a sword with a black hilt and a red sheath, suggesting a warrior or samurai theme. The outfit includes a flowing red cape and a green garment with intricate patterns, complemented by a large, ornate umbrella with a dark, textured design. The background features vertical stripes in shades of green, red, and purple, adding depth and contrast to the scene. The figure's hair is styled in a traditional manner, and the overall composition is dynamic, with the figure positioned slightly off-center, creating a sense of movement and focus. The artwork is signed "Doriana Dream" in the bottom left corner, indicating the artist's name.
Provided by @altbot, generated privately and locally using Ovis2-8B
🌱 Energy used: 0.197 Wh
I am just thrilled beyond belief to announce that, a full day ahead of schedule, I am releasing the newest version of the PETI firmware, version 0.5.0. This update, the Audio and Hygiene update, adds PWM-driven audio and the whole goofy poop mechanic to the game, as well as some minor QoL improvements.
arcanalabs.ca/news/labnotes/pe…
#virtualpet #maker #electronics #microcontrollers #diyelectronics
Releasing PETI Version 0.5.0: The Hygine and Audio Update
Arcana Labs - Puzzles and Proverbswww.arcanalabs.ca
Especially since all European countries will probably continue delivering arms to Ukraine anyway. After all, they were not invited on the call!
A bit like Ukrainian F-16 vs Mirage 2000. The US government has said it would not update the flight software on the F-16 anymore (a crucial point, since Russian forces are constantly trying new electronic warfare configurations) while Mirage 2000s are still updated.
UN human rights chief voices horror at Israel’s new Gaza strikes
Volker Türk calls for immediate end to violence and unconditional release of hostagesJennifer Rankin (The Guardian)
デスクトップ版 Vivaldi 7.2:スピードとスマートさを追求した本気のアップデート | Vivaldi Browser
デスクトップ版 Vivaldi 7.2 では、ブラウジング体験と速度を今まで以上に向上させました!カスタムのキーボードショートカットを使いこなすパワーユーザーやシンプルに使いたいユーザーはもちろん、誰にとってもメリットのあるアップデートです。Jon von Tetzchner (Vivaldi Technologies)
Servo Report Week 10 2025
Highlights from last week:
- Support CSS will-change
- Upgraded Stylo to 2025-03-01
- Continued improvements to the WebView API
- Added an about:memory page
You can help support Servo, an independent web browser engine, and the health of the web ecosystem by donating:
github.com/sponsors/servo
opencollective.com/servo
Sponsor @servo on GitHub Sponsors
Servo aims to empower developers with a lightweight, high-performance alternative for embedding web technologies in applications.GitHub
Enjoy faster browsing with today’s fresh update!
🏁 A smarter, quicker address bar
🏎️ Faster page loading
📅 Turn emails into calendar events
💰 New: Currency widget
⌨️ New: Override Keyboard Shortcuts
And there's more: vivaldi.com/blog/vivaldi-on-de…
#Vivaldi #Browser #Apps #Tech #Software #Email
Vivaldi 7.2: Speedy and smart, a serious update. | Vivaldi Browser
With Vivaldi 7.2, we’re stepping on the gas! Making sure your browsing experience is better than ever, and faster!Jon von Tetzchner (Vivaldi Technologies)
XORNADA Outra electrónica é posible, na Escola Técnica Superior de Enxeñaría de #Compostela.
📅 Xoves 20 de marzo
🤔 Pola mañá (12:30 a 13:30 na aula de proxectos) reflexionaremos sobre o consumo responsable de tecnoloxía electrónica.
🪛 Pola tarde (de 16 a 18:30, nalgún lugar ben visible da escola), tocará fedellar en computadoras para aprender a alongarlles a vida, no #RepairCafe de reparación colectiva coas compas do Banco de Reciclaxe Electrónica Municipal de Teo
Vivaldi 7.2 is out 🥳
Added some longstanding requests to the mail 📫 client in Vivaldi.
To add a Task, Invite, or Event to your Calendar 📅 just
1. Right click
- inside a mail,
- on a message in the mail list
- or highlight some text on a webpage
2. Click Add to Calendar
And you'll get a direct link to the message or webpage within the event.
It also automatically adds participants from the email for the invite.
Another thing (one of the top requests)
Reorder accounts in the mail panel is available in the settings using the arrows at the bottom of the list there 😀
social.vivaldi.net/@Vivaldi/11…
#vivaldi #mail #calendar
Vivaldi (@Vivaldi@vivaldi.net)
Attached: 1 image Enjoy faster browsing with today’s fresh update! 🏁 A smarter, quicker address bar 🏎️ Faster page loading 📅 Turn emails into calendar events 💰 New: Currency widget ⌨️ New: Override Keyboard Shortcuts And there's more: https://viva…Vivaldi Social
We have a credible report that an unknown number of ICE agents were seen between 8-9am in the parking lot of Market Basket and in the City Hall area of Chelsea, MA.
We do not have numbers or any description of them beyond that at this time. Will share if any more information becomes available.
Remember, spread information not panic:
Report only verified information from yourself or a trusted source and report the information as specifically as possible.
Get pictures if possible.
Read more here for what to do during a raid as an ally: unitedwedream.org/resources/ho…
#ChelseaMA #Massachusetts #ICE #ImmigrantRights
How U.S. Citizens Can Protect the Immigrant Community From the Deportation Force. - United We Dream
Now, more than ever, it is important for U.S. Citizen allies of immigrants to support the immigrant community by taking real actions if they witness a raid by Trump’s Deportation Force. But what can you do? Here are some ways you can support:United We Dream
British comic artist RE Burke *still* being held by ICE, for an administratively trivial visa issue. Being held in prison.
bleedingcool.com/comics/britis…
British Comics Artist R.E. Burke Still Being Held In US Detention Camp
UPDATE: She's coming home. Over a week ago, Bleeding Cool first reported the story of British cartoonist R.E Burke, or Becky Burke, who had been detained by ICE when crossing the US/Canada border over what was revealed as a trivial visa issue.Rich Johnston (Bleeding Cool News)
reshared this
Never again, we said, we were told, never again, never again, never again, never again, never again, never again, never again, never again.
Never again, never again. Never again, never again, never again, never again, never again, never again.
I heard this so often, growing up.
flipboard.com/@aljazeera/middl…
Israel ends ceasefire in Gaza
Israel has launched a deadly wave of airstrikes on Gaza, killing hundreds of Palestinians and ending the ceasefire.Al Jazeera
mhoye reshared this.
Ted Mielczarek
in reply to mhoye • • •I've Just Launched "Pwned Passwords" V2 With Half a Billion Passwords for Download
Troy Huntmhoye reshared this.
dch
in reply to Ted Mielczarek • • •Ted Mielczarek
in reply to dch • • •Dr. Eric J. Fielding, PhD
in reply to mhoye • • •Isaac Lyman
in reply to mhoye • • •Royce Williams
in reply to mhoye • • •You're right. They're broadly defining "compromised" as "appearing in any leak anywhere", so that a simple dictionary attack using a superset of all leaks would crack the password offline. (I've always had a beef with using HIBP to deny any password in that billion+ list, rather than just blocking the top few tens of thousands (to avoid trivial online spraying / guessing.)
So the check step is to take the plaintext they're being handed, and doing a HIBP k-anonymity lookup (or just downloading the entire corpus, which they already have everywhere because they're Troy's CDN for the raw unsalted hashes for both k-anonymity checks and full download).
One significant weakness in the k-anon lookups is that frequency count is returned with the hash. So an observer has a pretty strong chance that the first / top hash returned is the user's actual password.
And as mentioned elsewhere, the "check for similar passwords" option available at their Enterprise tier makes it even murkier. I can imagine opaque ways to make that check (running a variety of fast a
... show moreYou're right. They're broadly defining "compromised" as "appearing in any leak anywhere", so that a simple dictionary attack using a superset of all leaks would crack the password offline. (I've always had a beef with using HIBP to deny any password in that billion+ list, rather than just blocking the top few tens of thousands (to avoid trivial online spraying / guessing.)
So the check step is to take the plaintext they're being handed, and doing a HIBP k-anonymity lookup (or just downloading the entire corpus, which they already have everywhere because they're Troy's CDN for the raw unsalted hashes for both k-anonymity checks and full download).
One significant weakness in the k-anon lookups is that frequency count is returned with the hash. So an observer has a pretty strong chance that the first / top hash returned is the user's actual password.
And as mentioned elsewhere, the "check for similar passwords" option available at their Enterprise tier makes it even murkier. I can imagine opaque ways to make that check (running a variety of fast attacks using the current plain and checking for those hashes, etc) but access to the plaintexts directly would be more efficient.
1/