• masterspace@lemmy.ca
    link
    fedilink
    English
    arrow-up
    0
    ·
    2 months ago

    There was a previous article on this with more explanation that I’m struggling to find.

    The gist was that they do hash all passwords stored, the problem was that there was a mistake made with the internal tool they use to do that hashing which led to the passwords inadvertently going into some log system.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      0
      ·
      2 months ago

      “mistake”

      I call BS. The reviews I’ve gone through for trivial stuff would’ve exposed this.

      This was intentional.

      • HiddenLayer555@lemmy.ml
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Hanlon’s Razor revised: Never attribute to malice what can be attributed to incompetence, except where there is an established pattern of malice.

      • masterspace@lemmy.ca
        link
        fedilink
        English
        arrow-up
        0
        ·
        2 months ago

        Yeah, cause trivial systems are a lot easier to parse and review. At a base level that’s nonsense logic.

        • BearOfaTime@lemm.ee
          link
          fedilink
          arrow-up
          0
          ·
          1 month ago

          My point being the extensiveness of a review process.

          The more important a system, the more people it impacts, etc, the more extensive the review process.

          Someone chose to ignore this risk. That’s intentional.