Author

Topic: [Data Breach] Check if your passwords have been compromised (Read 805 times)

newbie
Activity: 27
Merit: 27
If you haven't changed your password here in Bitcointalk since around May 2015, you should change it. Make sure it is random and secure and longer than 12 characters.
hero member
Activity: 1750
Merit: 589
They are offering a service to check whether they have leaked your passwords or not, you just have to give them your passwords for them to check.

I don't see any reason to give anybody my passwords, no matter what they claim.
Imho the healthiest way over the internet is: trust no one.
However, it's a good way to check how good is their password manager implemented  Grin



Do you mind me asking are you using chome? I'm wondering why google doesn't even recognize I'm using an chromium-based keyring to encrypt passwords  Grin
Probably something Brave did so Google can't recognize jack shit. It's good to see their password manager works to keep themselves out though, that's useful!
I can't understand what is the essense of having your password checked by  an online platform, letting them check if changes are done, if it was hacked or was attempted to be hacked will require to give them access to it, meaning your password which is supposed to be private and only known by you will be given to the chrome which obviously not a good thing to do when talking about privacy. Although google chrome is a trusted and kniwn website, having anyone know your password aside from you is a very risky thing and is highly unrecommended.
legendary
Activity: 2604
Merit: 2353
Alternatively, you can also use https://haveibeenpwned.com/
Someone posted a while back that https://haveibeenpwned.com/ could be a good way for whoever created the site to check which emails and accounts are still active and have any importance to their users. If you search for your email on that site that means that it has some importance to you, it does make sense.  
No I don't think it's the goal of haveibeenpwned, personally I've checked mail addresses that I'm not really using anymore. Moreover there is a feature that let you use hashes of your passwords instead of your raw passwords, so it's highly unlikely to be a honey pot.
legendary
Activity: 2730
Merit: 7065
Alternatively, you can also use https://haveibeenpwned.com/
Someone posted a while back that https://haveibeenpwned.com/ could be a good way for whoever created the site to check which emails and accounts are still active and have any importance to their users. If you search for your email on that site that means that it has some importance to you, it does make sense. 
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7

This is a major security risk too you could alternatively download exposed passwords (which haveibeenpwned does not distribute but they are usually from public leaks) and check it offline because you are still entering a password into a different site other than the ones its used for which is a security breach in itself unless you trust a third party with storing your password to check if its been "pwned".

What are you talking about? How is using haveibeenpwned a security risk? You obviously don't enter your password on haveibeenpwned, only your email is required. Or did I misunderstood what you're trying to say here?
He was probably talking about this:
https://haveibeenpwned.com/Passwords

This is a separate feature from their email watching service, it also notifies people if their password was leaked, but you only send them a small part (called suffix) at the start of the hash of your password, and they return all the hashes from their database that also start with the same suffix, and then the code on client's side looks if any of the hashes matches the original hash.
legendary
Activity: 1722
Merit: 2213
The vulnerability example you gave however effected Chrome, not Chromium.

Nope. You are not right again. If you looked at the link that I gave above, you would go to the original description of the bug:
https://bugs.chromium.org/p/chromium/issues/detail?id=913964
So, CVE-2019-5787 (Issue 913964 in the repository) is a Chromium bug.
There are patch for the bug:
https://chromium.googlesource.com/chromium/src.git/+/8cbb211d93b114c2bc348837d787aa5c8e545e40

You can check other Chromium security bugs: https://bugs.chromium.org/p/chromium/issues/list?q=type%3Abug-security%20os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows&can=1

Fair enough, I take it back, apologies! I did look at the link you provided, but to be fair it only documented  the chrome bug (through the chromium list), there wasn't any documentation or testing there of it also affecting chromium, apart from the assumption based on software knowledge. Note the tests were through ./chrome not ./chromium. But, after thorough research (basically searching for the "CVE" and "chromium") it did confirm it was also a bug in chromium from Debian and Red Hat releases which I trust, even if they didn't specify why. Call me a fool, but the description is very misleading too, there is no mention of the CVE affecting chromium:

I do not know by what principle they relate CVE to which vendor.
But as you can see above, the bug is declared and fixed in the chromium.
So brave had this bug too.

By the way, they paid $ 3,000 for this bug.

My only thought why it isn't listed as a CVE for Chromium/Brave if they only list the CVE from the vendor that publishes it. As this was Chrome, as oppose to Chromium (which didn't even mention it on their blog as far as I could find), then I guess it doesn't additionally get listed as a Chromium/Brave bug. Even though the CVE's lists all the affected versions, so it's very bizarre not actually listing all the affecting products. This also makes it very hard to identify chrome bugs that do/don't affect chromium imo.

It's good to know they donated $3,000 for this bug at least.
legendary
Activity: 2324
Merit: 1604
hmph..
Checking password with Google is bad idea i think.
We like giving away our password to them, who sell our privacy for ads.
Also if some hacker can hack our email in the future, they can know what password you used.

Exactly, every password was synchronized with google account can be accessed from password manager pages. Very easy for hacker who already successfully hacked our account to open all of our password. For everyone who doesn't know before, you can check your saved password at https://passwords.google.com/ that's why, it will very easy for hackers know all of your passwords in case your email got hacked
sr. member
Activity: 432
Merit: 250
Febriyana Muhammad
Checking password with Google is bad idea i think.
We like giving away our password to them, who sell our privacy for ads.
Also if some hacker can hack our email in the future, they can know what password you used.
mk4
legendary
Activity: 2870
Merit: 3873
Paldo.io 🤖

This is a major security risk too you could alternatively download exposed passwords (which haveibeenpwned does not distribute but they are usually from public leaks) and check it offline because you are still entering a password into a different site other than the ones its used for which is a security breach in itself unless you trust a third party with storing your password to check if its been "pwned".

What are you talking about? How is using haveibeenpwned a security risk? You obviously don't enter your password on haveibeenpwned, only your email is required. Or did I misunderstood what you're trying to say here?
legendary
Activity: 1232
Merit: 1080
Alternatively, you can also use https://haveibeenpwned.com/

They even have a notification service whereas you would be notified if one of the websites your certain email is registered on is hacked/compromised, so you can change your password on that website as soon as possible to prevent problems with your account.

This is a major security risk too you could alternatively download exposed passwords (which haveibeenpwned does not distribute but they are usually from public leaks) and check it offline because you are still entering a password into a different site other than the ones its used for which is a security breach in itself unless you trust a third party with storing your password to check if its been "pwned". It would be easier for you to just change your password than to check if its been leaked and is recommended to change your password every 2 weeks.
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
You shouldn’t be reusing passwords anyway, so there shouldn’t be any value to use that service. The same is true for even part of your password.

If you are using something very close to a random password, having one compromised should not affect your security on any other site and you can search by username to check if a database has been compromised

And yet a lot of people do reuse their passwords, so this service can teach them how bad it is to reuse passwords with practical example. It also shows how easily weak passwords can be broken - even if your "password1" was never leaked on the site that you use, the same password could have been leaked on some different platform by different users.

Don't discard something because it is useless to you, lots of other people aren't as knowledgeable.
A third party having their password leaked doesn’t affect the security of your password if you happen to use a similar password provided it is semi-random.
hero member
Activity: 750
Merit: 511
The vulnerability example you gave however effected Chrome, not Chromium.

Nope. You are not right again. If you looked at the link that I gave above, you would go to the original description of the bug:
https://bugs.chromium.org/p/chromium/issues/detail?id=913964
So, CVE-2019-5787 (Issue 913964 in the repository) is a Chromium bug.
There are patch for the bug:
https://chromium.googlesource.com/chromium/src.git/+/8cbb211d93b114c2bc348837d787aa5c8e545e40

You can check other Chromium security bugs: https://bugs.chromium.org/p/chromium/issues/list?q=type%3Abug-security%20os%3DAndroid%2Cios%2Clinux%2Cmac%2Cwindows&can=1

I do not know by what principle they relate CVE to which vendor.
But as you can see above, the bug is declared and fixed in the chromium.
So brave had this bug too.

By the way, they paid $ 3,000 for this bug.
hero member
Activity: 776
Merit: 557
So far all my passwords are secured using all the tools posted here, all my emails need phone verification to open and every Gmail account holders should do the same, to avoid their account get compromised and always clean your cache, and install a good anti virus if you are involved in Cryptocurrency, security of your account should be high in your priority.

You don't need a antivirus if you take precautions while downloading and browsing the internet. Anti virus is just bloatware which can slow down your computer. Linux does not use a antivirus and many people on Windows who are taking caring while downloading software don't need it. Anti virus is only there for people who are not tech savvy.
legendary
Activity: 1722
Merit: 2213
Bare in mind that Chrome has 100+ vulnerabilities per year, Brave hasn't had one yet in 2019. Just saying  Grin

No, you are not right. The brave is based on the chromium and has exactly the same vulnerabilities as a chromium.
For example, CVE-2019-5787.
This vulnerability was fixed in chromium [edit: chrome] 73.0.3683.75.
And here is the brave update for this version: https://github.com/brave/brave-browser/issues/3669


I hear what you are saying, Brave is a fork of Chromium. True story.

The vulnerability example you gave however effected Chrome, not Chromium. Chrome is based on Chromium, not the other way around, believe it or not. Hence Chromium also hasn't had a vulnerability this year either, which is why Brave hasn't, or any forks of Brave for that matter. Why Chrome takes open source software and modifies it to generate on average a vulnerability every other day is anyone's guess, but ultimately unrelated to this topic. It's corporate-owned proprietary software, of course it's vulnerable!

You maybe right that this Chrome vulnerability did effect both Chromium and Brave, but without any documented evidence (CVE's), and without being a qualified programmer, I think it's far fetched to claim that this is the case. Please provide (actual) evidence to the contrary and I'd be happy to reconsider my opinion. The brave merge you referenced isn't tagged, labeled or referenced as a vulnerablity in any way, shape or form, as far as I can tell. It just confirms that when chromium updates it's stable branch, then brave follows suit, as you would hope and imagine. Now does it make sense why people use open-source software to stay safe and not proprietary closed-source software?

Correction: Here
mk4
legendary
Activity: 2870
Merit: 3873
Paldo.io 🤖
and install a good anti virus if you are involved in Cryptocurrency, security of your account should be high in your priority.

Or better, learn to use Linux! Then you wouldn't even need to install an antivirus as long as you don't do something utterly careless like executing random commands you've found over the internet. Linux distros like Ubuntu and Linux Mint are honestly decently noob friendly now, compared to how they were 5 years ago.
hero member
Activity: 750
Merit: 511
all my emails need phone verification to open and every Gmail account holders should do the same

It's better to use the something like Google Authenticator than a phone for protection due sim swapping.
I have already met a number of such cases in crypto and in traditional banks sphere.
This is a targeted attack, respectively, if you have significant amounts - you should think about it.
sr. member
Activity: 2030
Merit: 269
So far all my passwords are secured using all the tools posted here, all my emails need phone verification to open and every Gmail account holders should do the same, to avoid their account get compromised and always clean your cache, and install a good anti virus if you are involved in Cryptocurrency, security of your account should be high in your priority.
hero member
Activity: 750
Merit: 511
Bare in mind that Chrome has 100+ vulnerabilities per year, Brave hasn't had one yet in 2019. Just saying  Grin

No, you are not right. The brave is based on the chromium and has exactly the same vulnerabilities as a chromium.
For example, CVE-2019-5787.
This vulnerability was fixed in chromium 73.0.3683.75.
And here is the brave update for this version: https://github.com/brave/brave-browser/issues/3669
mk4
legendary
Activity: 2870
Merit: 3873
Paldo.io 🤖
My personal tip, use a brand new email for every new website you need to create an account with, if they require an email address. You can easily make one even using gmail and any old android phone.

We cannot use separate email for every website we register. First it will be hassle to create hundreds of emails as every email require you to verify it with the phone number and managing them is not an easy task. I personally have 3 email ids and they are enough for me.

Privacy-focused email services like Protonmail and Tutanota exists, and if you pay for their service, you can have email aliases, so you wouldn't need to create separate emails for different websites. You just create a new alias then you're good to go.

Also, if you're just going to register on a website and you're going to use your account probably once(especially on shitty and shady websites), you can use burner emails through services like guerrillamail.com.
legendary
Activity: 3024
Merit: 2148
You shouldn’t be reusing passwords anyway, so there shouldn’t be any value to use that service. The same is true for even part of your password.

If you are using something very close to a random password, having one compromised should not affect your security on any other site and you can search by username to check if a database has been compromised

And yet a lot of people do reuse their passwords, so this service can teach them how bad it is to reuse passwords with practical example. It also shows how easily weak passwords can be broken - even if your "password1" was never leaked on the site that you use, the same password could have been leaked on some different platform by different users.

Don't discard something because it is useless to you, lots of other people aren't as knowledgeable.
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
The last I checked, haveibeenpwned actually will only ask the end user to input the username/email and they will respond with any accounts associated with databases that have been compromised containing that email address or username.

https://haveibeenpwned.com/Passwords

This is a separate feature from their email watching service, it also notifies people if their password was leaked, but you only send them a small part (called suffix) at the start of the hash of your password, and they return all the hashes from their database that also start with the same suffix, and then the code on client's side looks if any of the hashes matches the original hash.

By the way, haveibeenpwned accepts Bitcoin donations, which is a good example of Bitcoin's adoption and real use.
You shouldn’t be reusing passwords anyway, so there shouldn’t be any value to use that service. The same is true for even part of your password.

If you are using something very close to a random password, having one compromised should not affect your security on any other site and you can search by username to check if a database has been compromised
hero member
Activity: 3024
Merit: 614
Leading Crypto Sports Betting & Casino Platform
Ok I go to the link you posted here  and this is what it says
Quote
Welcome to your Password Manager
You have not saved any passwords in your Google Account. Add passwords from Chrome or Android to manage and check them for security issues.

I'm glad I never saved any password or any of my family that uses my computer, it's a bad idea because we all know they can access all of it in Google chrome settings, try other ways to save your passwords but never use Google password setting at any time and tell your family to do the same
legendary
Activity: 3024
Merit: 2148
The last I checked, haveibeenpwned actually will only ask the end user to input the username/email and they will respond with any accounts associated with databases that have been compromised containing that email address or username.

https://haveibeenpwned.com/Passwords

This is a separate feature from their email watching service, it also notifies people if their password was leaked, but you only send them a small part (called suffix) at the start of the hash of your password, and they return all the hashes from their database that also start with the same suffix, and then the code on client's side looks if any of the hashes matches the original hash.

By the way, haveibeenpwned accepts Bitcoin donations, which is a good example of Bitcoin's adoption and real use.
member
Activity: 92
Merit: 15
Baronets is the Jet Cash domain management service
We cannot use separate email for every website we register. First it will be hassle to create hundreds of emails as every email require you to verify it with the phone number and managing them is not an easy task. I personally have 3 email ids and they are enough for me.

Host your own mail server, and group the email addresses. This has the added benefit of allowing you to see who is selling your addresses.
copper member
Activity: 1666
Merit: 1901
Amazon Prime Member #7
Alternatively, you can also use https://haveibeenpwned.com/

They even have a notification service whereas you would be notified if one of the websites your certain email is registered on is hacked/compromised, so you can change your password on that website as soon as possible to prevent problems with your account.

Haveibeenpwned uses cryptography to guarantee users that they don't collect their submitted plaintext passwords - but we don't know how passwords.google.com works, and if they give us any guarantees, so it's better to avoid it.

The last I checked, haveibeenpwned actually will only ask the end user to input the username/email and they will respond with any accounts associated with databases that have been compromised containing that email address or username.
sr. member
Activity: 1204
Merit: 288
There is a special telegram bot that is built to check your e-mail and across the Internet for compromise.

 I recently checked and saw that my e-mail with the old password was already several times freely accessible

Thank God that there was not a main password.
hero member
Activity: 2506
Merit: 645
Eloncoin.org - Mars, here we come!
I also didn't know there's encryption option within Google's password manager.

While it might help you protect your password again hacker, but i doubt your password is safe against Google itself.

I'm also thinking the same way. I never saved my passwords on google at all. It is because google have many problems that's why I don't save my passwords in google. Just like their playstore letting those scammers to add their scam apps in there play store which is not good crypto enthusiast. Even though it's encrypted, I still don't want to save my password.


You can use KeyPass (https://keepass.info/), a local application to store all your passwords if you do not trust the online password manager like this google password manager.


My personal tip, use a brand new email for every new website you need to create an account with, if they require an email address. You can easily make one even using gmail and any old android phone.

We cannot use separate email for every website we register. First it will be hassle to create hundreds of emails as every email require you to verify it with the phone number and managing them is not an easy task. I personally have 3 email ids and they are enough for me.
legendary
Activity: 2814
Merit: 1112
Leading Crypto Sports Betting & Casino Platform

My personal tip, use a brand new email for every new website you need to create an account with, if they require an email address. You can easily make one even using gmail and any old android phone.


I can't imagine how many emails you need, especially if you are an active person in online world  Smiley

I feel I don''t need it all because when our passwords change, we are  the first to get notofications via email and if that happens the next step is to immediately change the password.
Account an exchange or an email easy to hack then it indicates that we are not enough to secure these accounts with additional security such as authy or anykind of seurity.
legendary
Activity: 2324
Merit: 1604
hmph..
Well, I tried some of my email addresses to check if I really get pawned or one of my email addresses is included on some website breaches.
I want some advice or suggestion, if I entered my addresses and it says it is compromised or pawned, what should I do?
Should I abandon that email address or maybe I can only change the password of my email address?

Because I am worried that maybe that website is only collecting the email address of every user who entered their email addresses on their website.

Abandon your email may be the best way for you. But, if you think that email very important to you, change your passwords is the only options. About collecting data, based on their privacy page, they are saying not store any email data from users who submitted on check form.
When you search for an email address
Searching for an email address only ever retrieves the address from storage then returns it in the response, the searched address is never explicitly stored anywhere.

But I think it's not guaranteed if something happen behind. DYOR
legendary
Activity: 2506
Merit: 1394
Alternatively, you can also use https://haveibeenpwned.com/
I am still curious on this website if this is really legit?
Well, I tried some of my email addresses to check if I really get pawned or one of my email addresses is included on some website breaches.
I want some advice or suggestion, if I entered my addresses and it says it is compromised or pawned, what should I do?
Should I abandon that email address or maybe I can only change the password of my email address?

Because I am worried that maybe that website is only collecting the email address of every user who entered their email addresses on their website.
member
Activity: 406
Merit: 10
My personal tip, use a brand new email for every new website you need to create an account with
If i have been using new emails for every site i signed up on i would be having hundreds of emails already and that's a very bad idea, i would even be having the issue of trying to remember which email i used for which site.
hero member
Activity: 2268
Merit: 669
Bitcoin Casino Est. 2013
I also didn't know there's encryption option within Google's password manager.

While it might help you protect your password again hacker, but i doubt your password is safe against Google itself.

I'm also thinking the same way. I never saved my passwords on google at all. It is because google have many problems that's why I don't save my passwords in google. Just like their playstore letting those scammers to add their scam apps in there play store which is not good crypto enthusiast. Even though it's encrypted, I still don't want to save my password.
legendary
Activity: 2744
Merit: 1708
First 100% Liquid Stablecoin Backed by Gold
I don't see any reason to give anybody my passwords, no matter what they claim...



I didn't know that such a possibility exists in Google Chrome and when I saw this post started to figure out how to set up a passphrase in google account to encrypt my passwords.

It took me a while but finally, I managed to do this and here is the full set up.



I think this could be useful for other members who will be interested in protecting their passwords with encryption in the Google Chrome browser.
legendary
Activity: 1722
Merit: 2213
Do you mind me asking are you using chome?

Yes, I'm using Chrome. Somehow I was too lazy to change to Brave, I still don't like Opera and I still find Firefox unconvincing in making me return to it.

It's OK I found my answer: Google accounts integration ("GAIA") is disabled. That'd be why  Smiley Changing from Chrome to a Chromium-fork is more or less unnoticeable imo.  
Bare in mind that Chrome has 100+ vulnerabilities per year, Brave hasn't had one yet in 2019. Just saying  Grin
Correction: Here
newbie
Activity: 27
Merit: 27
I don't use Chrome.
I don't use Google except for a personal Gmail account that has no other purpose.

I wouldn't want to save any passwords with Google, what if they are the ones that get hacked?


My personal tip, use a brand new email for every new website you need to create an account with, if they require an email address. You can easily make one even using gmail and any old android phone.

For passwords, well, everyone has a wallet right? My passwords look like bitcoin addresses or private keys. Use a password manager or even some notepad on your desktop.
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
Do you mind me asking are you using chome?

Yes, I'm using Chrome. Somehow I was too lazy to change to Brave, I still don't like Opera and I still find Firefox unconvincing in making me return to it.
legendary
Activity: 1722
Merit: 2213
They are offering a service to check whether they have leaked your passwords or not, you just have to give them your passwords for them to check.

I don't see any reason to give anybody my passwords, no matter what they claim.
Imho the healthiest way over the internet is: trust no one.
However, it's a good way to check how good is their password manager implemented  Grin



Do you mind me asking are you using chome? I'm wondering why google doesn't even recognize I'm using an chromium-based keyring to encrypt passwords  Grin
Probably something Brave did so Google can't recognize jack shit. It's good to see their password manager works to keep themselves out though, that's useful!
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
They are offering a service to check whether they have leaked your passwords or not, you just have to give them your passwords for them to check.

I don't see any reason to give anybody my passwords, no matter what they claim.
Imho the healthiest way over the internet is: trust no one.
However, it's a good way to check how good is their password manager implemented  Grin

legendary
Activity: 1722
Merit: 2213
This requires you to save your password in your Google account which sounds like a bad idea from both privacy and security standpoints. Google has proven many times that they can't be trusted with personal data, and you also create more surface for attackers who'd want to compromise your accounts - instead of just one device, all of your devices that are connected to Google could be used to steal your passwords.

They are offering a service to check whether they have leaked your passwords or not, you just have to give them your passwords for them to check.
Makes total sense, as long as they don't leak them yet again  Tongue

What you want to see at this link is something like this:

legendary
Activity: 3024
Merit: 2148
This requires you to save your password in your Google account which sounds like a bad idea from both privacy and security standpoints. Google has proven many times that they can't be trusted with personal data, and you also create more surface for attackers who'd want to compromise your accounts - instead of just one device, all of your devices that are connected to Google could be used to steal your passwords.

Alternatively, you can also use https://haveibeenpwned.com/

They even have a notification service whereas you would be notified if one of the websites your certain email is registered on is hacked/compromised, so you can change your password on that website as soon as possible to prevent problems with your account.

Haveibeenpwned uses cryptography to guarantee users that they don't collect their submitted plaintext passwords - but we don't know how passwords.google.com works, and if they give us any guarantees, so it's better to avoid it.
mk4
legendary
Activity: 2870
Merit: 3873
Paldo.io 🤖
Alternatively, you can also use https://haveibeenpwned.com/

They even have a notification service whereas you would be notified if one of the websites your certain email is registered on is hacked/compromised, so you can change your password on that website as soon as possible to prevent problems with your account.
sr. member
Activity: 1330
Merit: 326
This is it, Google make a way to secure our log in credentials and passwords to prevent data breaches.

There is a called, "Password check up". To access and check it, you can try it in passwords.google.com. It was available as an extension that Google can access.

I managed to be able to try it. Seems I have 11 websites that I have log in and can check up my passwords.





Find more here.
Jump to: