Hacker Newsnew | past | comments | ask | show | jobs | submit | ewenjo's commentslogin

Watch Together is also being removed


Which got a lot of people (including me, also a lifetime subscriber) in this thread absolutely livid: https://forums.plex.tv/t/allow-watch-together-for-tv-shows-m...

(We were begging for them to fix the functionality of watch together for almost 5 years)


> Investigating - Cloudflare is aware of, and investigating, an issue which potentially impacts multiple users that use 1.1.1.1 public resolver. Further detail will be provided as more information becomes available.

https://www.cloudflarestatus.com/


Yeah, I was looking around, but saw no mention of it anywhere until I realized it just happened.


Just noticed the site now alerts this:

> Have you ever felt like the Internet Archive runs on sticks and is constantly on the verge of suffering a catastrophic security breach? It just happened. See 31 million of you on HIBP!


Jokes on them... I'm already on HIBP countless of times...


It's all good, as long as you're not in that recent AI Girlfriend breach which exposed a ton of users who were trying to coax it into generating CSAM images.

https://x.com/troyhunt/status/1843788319785939422


“I went to the site to jerk off (to an adult scenario, to be clear) and noticed that it looked like it [the Muah.ai website] was put together pretty poorly,” the hacker told 404 Media. “It's basically a handful of open-source projects duct-taped together. I started poking around and found some vulnerabilities relatively quickly. At the start it was mostly just curiosity but I decided to contact you once I saw what was in the database.”

What a nice guy.


True penetration testing.


Well, only success with one kind.


Not sure if you're being sarcastic or not, but pentesting is not a particularly evil activity — and you often have to look at data to see if you actually found something.

What is evil is the way that he's ensured that the predators in the dataset will never face any consequences by making the data available to HaveIBeenPwned, making it trivial for predators to protect themselves (the method through which this is possible intentionally left as an exercise for the reader), and making the data available to a news website for...some reason, but it's bound to ensure that the vulnerability will be patched out quickly and no one else will be able to access the data.

I find it much more likely that this hacker who sought out a website for uncensored AI erotica isn't actually a good guy, and might even have something to hide within the dataset. Hopefully, I'm wrong and we'll see more of this.


How would that protect predators?


Did you miss the joke? Parent poster means penetration as in penetrative sex


I'm also on HIBP over 10x. What are we supposed to do? Create a new email address for every service we sign up for?

I don't know what the best practice is for keeping our personal data safe anymore.


> Create a new email address for every service we sign up for?

Exactly that, yes! Various services like icloud or proton offer "hide-my-email" addresses, or you can use any email service and just leverage a dedicated email aliasing service like SimpleLogin (paid but cheaper).

This way your email addresses are always random, and since these are shared services, the fact that it's random doesn't identify you either. In proton's / simplelogin's case, you can even set the display name used and email first, so from the outside it's not going to appear as strange, or have any real limitations.

If you think about it, modern email services don't really allow for easily testing if an email address is valid or not, so pretty much the only way your email is ever found out is if you share it on. So never share it on. Always share an alias instead. With automated systems, you may even want to rotate it every so often, so that if there's a leak, you can identify not just who leaked, but also roughly when.

Fixed identifiers, like an email address, are terrible, as their lifetime is always significantly longer than whatever context they're being used in for.


Using unique email addresses makes phishing attempts extremely obvious…

(No, this official looking email from my bank is fake since it was sent to Grocery@my.domain …)


I get a ton of "This is your email administrator -- your email password needs to be reset" to github@mydomain


Hey at least after they fill your account up with spam they also send you warnings that you are running out of space.


Truly unique email addresses and passwords per service is the strongest approach, but there may be alternatives. For instance, Gmail allows address+tag@gmail.com, which will save you from the lowest hanging fruit (block the +tag when it’s compromised to prevent the laziest spam from reaching you). iCloud also allows automatically generating a new email address that forwards to your inbox for a new account when using iCloud Keychain (possibly when using other password managers too, but I haven’t tried).


Gmail's +tag (and the .) is nice in theory, but terrible in practice. It's super easy for malicious actors to just drop them and there are a few services out there that simply are not able to work with the +tag, potentially getting you locked you out of your own account. Not gmail's fault, but I would recommend against using it.


> Create a new email address for every service we sign up for?

Yes! Just get a domain and have every email it go to you. Mine is something like “@super-secure-no-viruses.email”


There are probably people that would sign up for such a mail. Like urlify.io and other similar URL "shorteners".


Yep. ~300 addresses on my domain, 0 breaches across all of them on HIBP domain search over >6 years.

I guess internet security is not as bad these days. :)


Password manager + unique password per site + 2FA for anything of value.


And my SSN's probably available for purchase with 9 types of crypto, too.


I assume that if this is a bad actor, then account email/name will be leaked?


Is it a genuine alert, or hacking artifact?

Sometimes with friendly / attempt-at-humorous error messages it’s difficult to tell


I feel like it's safe to assume the official Internet Archive would not write a "friendly"/attempt-at-humurous/unprofessional/confusing/delivered-by-popup message advertising a devastating security breach. Oh also while announcing that nowhere else.

Obv an attackers ability to insert a message does imply a breach beyond a DoS. But I am pretty confident that message was not from the IA.


It's a literal window.alert()


But was that code placed there by IA or by the malicious party?


Verge reports someone has taken credit for an ongoing DDOS against IA. "An account on X called SN_Blackmeta said it was behind the attack and implied that another attack was planned for tomorrow" https://www.theverge.com/2024/10/9/24266419/internet-archive...


Ok, let's switch to that link. Thanks!

Submitted URL was https://archive.org/.


The verge generally is clickbait, another site choice would have been better.


That class of sites generally is, yes. But on HN we go by article quality, not site quality (https://hn.algolia.com/?dateRange=all&page=0&prefix=false&so...) and I didn't see a better specific article on this. If there is a better one, we can change the link again.


This bad actor has videos of them supposedly “ddosing” Spotify by pinging 1.1.1.1 in two terminal windows on their Twitter.

Is there any link between them and the real attack or are they just unrelated people claiming credit for it?


Sounds snarky to me. I'll bet it was the malicious party.


it wouldn’t be a window.alert if it were IA


Merry Christmas!


Interested if still available :)



Apprently Fastly was having issues which affected a lot of sites



Ah no wonder Stackoverflow wasn't loading but HackerNews was. I thought I was having trouble with my corporate firewall...


Correct. It auto copies the code if the TOTP secret key has been set for that item.


bitwarden's TOTP only runs on android/ios and not the mac app?


Appears to only have been a minor outage.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: