giszmo (OP)
Legendary
Offline
Activity: 1862
Merit: 1114
WalletScrutiny.com
|
|
September 22, 2011, 11:21:52 AM |
|
Hi, I want to ask course of action as the other thread doesn't get the necessary attention. http://50.19.139.134/test.phpleaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure. Is there any place to go to get all these mail accounts locked down?
|
ɃɃWalletScrutiny.com | Is your wallet secure?(Methodology) WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value. | ɃɃ |
|
|
|
mikethebodacious
Member
Offline
Activity: 64
Merit: 10
|
|
September 22, 2011, 12:21:36 PM |
|
Wow, that sucks pretty hardcore. I would just say if you're on that list to change your password immediately and hopefully wherever they got this account info from will get locked down soon!
|
|
|
|
fcmatt
Legendary
Offline
Activity: 2072
Merit: 1001
|
|
September 22, 2011, 01:06:06 PM |
|
Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.
|
|
|
|
Cryptoman
|
|
September 22, 2011, 01:08:44 PM |
|
Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.
I clicked; it's not malware. You can bring up the directory if you'd rather at http://50.19.139.134/.
|
"A small body of determined spirits fired by an unquenchable faith in their mission can alter the course of history." --Gandhi
|
|
|
fcmatt
Legendary
Offline
Activity: 2072
Merit: 1001
|
|
September 22, 2011, 01:12:09 PM Last edit: September 23, 2011, 12:21:33 AM by Maged |
|
Who puts plain text files on www as test.php. Fails to mention the pool name. This smells. Dont click.
I clicked; it's not malware. You can bring up the directory if you'd rather at http://50.19.139.134/. What pool is the info from and how did the op get it?
|
|
|
|
giszmo (OP)
Legendary
Offline
Activity: 1862
Merit: 1114
WalletScrutiny.com
|
|
September 22, 2011, 01:21:29 PM |
|
What pool is the info from and how did the op get it?
No idea which pool it was. Those affected will know. I got the link from the other thread. Apparently this document is in google's search index.
|
ɃɃWalletScrutiny.com | Is your wallet secure?(Methodology) WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value. | ɃɃ |
|
|
|
Serge
Legendary
Offline
Activity: 1050
Merit: 1000
|
|
September 22, 2011, 01:34:58 PM |
|
if someone wants my worker password, to mine bitcoins for me, just ask =)
|
|
|
|
flower1024
Legendary
Offline
Activity: 1428
Merit: 1000
|
|
September 22, 2011, 02:57:08 PM |
|
Hi, I want to ask course of action as the other thread doesn't get the necessary attention. http://50.19.139.134/test.phpleaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure. Is there any place to go to get all these mail accounts locked down? please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!! i can handle spam....
|
|
|
|
Ayo_4_Yayo
Newbie
Offline
Activity: 42
Merit: 0
|
|
September 22, 2011, 03:27:02 PM |
|
All this talk of leaks means someone left the water running, think of the waste.
|
|
|
|
giszmo (OP)
Legendary
Offline
Activity: 1862
Merit: 1114
WalletScrutiny.com
|
|
September 22, 2011, 03:39:28 PM |
|
please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!!
*sigh* ... google can definitely check if your password leaked or not from that list. In case it did and only then should they lock down your account for reactivation via date of birth, sms or whatever ...
|
ɃɃWalletScrutiny.com | Is your wallet secure?(Methodology) WalletScrutiny checks if wallet builds are reproducible, a precondition for code audits to be of value. | ɃɃ |
|
|
|
hollajandro
Member
Offline
Activity: 83
Merit: 10
|
|
September 22, 2011, 10:48:49 PM |
|
Since miner passwords are sent in plaintext every time your miner connects to a pool, I'd say anyone using this password anywhere else almost deserves it.
|
|
|
|
greyhawk
|
|
September 22, 2011, 10:51:32 PM |
|
Hi, I want to ask course of action as the other thread doesn't get the necessary attention. http://50.19.139.134/test.phpleaked thousands of mails with worker passwords but many are legit passwords of the mail accounts too for sure. Is there any place to go to get all these mail accounts locked down? please... DO NOT LOCK DOWN MY EMAIL ACCOUNT!!!!!!!!!! i can handle spam.... Which one is it?
|
|
|
|
sadpandatech
|
|
September 23, 2011, 05:25:41 AM |
|
Well, no offense to anyone that does not know any better, butttttttttttt.. Anyone who uses the same email, username, password or any combination of the 3 on more than one thing online these days is fuggin retarded.......
|
If you're not excited by the idea of being an early adopter 'now', then you should come back in three or four years and either tell us "Told you it'd never work!" or join what should, by then, be a much more stable and easier-to-use system. - GA
It is being worked on by smart people. -DamienBlack
|
|
|
dust
|
|
September 23, 2011, 07:10:22 AM |
|
Link is dead now. Anyone know which pools this info is from?
|
|
|
|
repentance
|
|
September 23, 2011, 07:42:32 AM |
|
Link is dead now. Anyone know which pools this info is from?
Nofeemining. The other thread is only three pages long if you want to know more about it. It's part of their old database. https://bitcointalk.org/index.php?topic=45216.msg539852#msg539852Given that the files themselves were from July and the many good reasons for people to have changed their passwords around that time, it's insane if those passwords are still valid for anyone's email or exchange accounts (and judging by the other thread, at least some of them are still valid for email accounts).
|
All I can say is that this is Bitcoin. I don't believe it until I see six confirmations.
|
|
|
|