Bear in mind the key here is to decrypt the hashes which are publically circulating. If you give them a password to hash for you, then they can then search for that hash and get a list of everyone who's used that password. Even if it's just one person, that's one password less they need to put through a rainbow table of hashes.
All the best, -- Jon "The Nice Guy" Spriggs On 7 June 2012 10:36, Steve Flynn <anothermindb...@gmail.com> wrote: > On 7 June 2012 03:29, Phill Whiteside <phi...@ubuntu.com> wrote: > >> >> Anyways, don't go near the phishing site.... http://www.leakedin.org/ >> Except for a giggle :) >> >> What a wally! > > Not much of a phishing site if it doesn't have any means of collating > your login name... > > -- > Steve > > When one person suffers from a delusion it is insanity. When many > people suffer from a delusion it is called religion. > > -- > ubuntu-uk@lists.ubuntu.com > https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk > https://wiki.ubuntu.com/UKTeam/ -- ubuntu-uk@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-uk https://wiki.ubuntu.com/UKTeam/