The same threat actor has leaked larger amounts of data from LinkedIn dated 2023. They claim this new data contains 35M lines and is 12 GB uncompressed.

  • @kungen@feddit.nu
    link
    fedilink
    English
    181 year ago

    I’m not sure what you’re implying here regarding headers? Email is insecure regardless; even when using SMTP with TLS, it’s not like the headers are exposed whereas the body would be encrypted or something.

      • @kungen@feddit.nu
        link
        fedilink
        English
        101 year ago

        well with PGP, the header is unencrypted

        Is there a single large company that even sends PGP email?

        logging into example.com with the user’s email and that 2fa code is going to be a breeze

        Sure, IF 1. you already have the user’s password, and 2. a new code wouldn’t be required/the previous code invalidated when initiating a new login session?

        Like, I’m not saying that 2FA codes via email is secure, but you’re implying that they are making a security hole via this - which I don’t see.

        • Phoenixz
          link
          fedilink
          English
          41 year ago

          Pgp, the greatest program never used by anyone

          • brothershamus
            link
            fedilink
            11 year ago

            I used it. For about 10 minutes. Then I read the help files. Then I searched. Then I used it some more. Then I uninstalled it.

            • @jarfil@lemmy.world
              link
              fedilink
              English
              11 year ago

              Unless you followed by installing gpg… then you failed. There are tons of uses for it, not necessarily encrypting emails (or more precisely, it kind of sucks at encrypting emails).

        • @locuester@lemmy.zip
          link
          fedilink
          English
          11 year ago

          Yeah not following the logic. 2FA via email is insecure. Doesn’t matter where in the email. That person is confused about something.