Bear in mind the key here is to decrypt the hashes which are
publically circulating. If you give them a password to hash for you,
then they can then search for that hash and get a list of everyone
who's used that password. Even if it's just one person, that's one
password less they need to put through a rainbow table of hashes.

All the best,
--
Jon "The Nice Guy" Spriggs


On 7 June 2012 10:36, Steve Flynn <anothermindb...@gmail.com> wrote:
> On 7 June 2012 03:29, Phill Whiteside <phi...@ubuntu.com> wrote:
>
>>
>> Anyways, don't go near the phishing site.... http://www.leakedin.org/
>> Except for a giggle :)
>>
>> What a wally!
>
> Not much of a phishing site if it doesn't have any means of collating
> your login name...
>
> --
> Steve
>
> When one person suffers from a delusion it is insanity. When many
> people suffer from a delusion it is called religion.
>
> --
> ubuntu-uk@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
> https://wiki.ubuntu.com/UKTeam/

-- 
ubuntu-uk@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk
https://wiki.ubuntu.com/UKTeam/

Reply via email to