• masterspace@lemmy.ca
    link
    fedilink
    English
    arrow-up
    18
    ·
    1 month ago

    There was a previous article on this with more explanation that I’m struggling to find.

    The gist was that they do hash all passwords stored, the problem was that there was a mistake made with the internal tool they use to do that hashing which led to the passwords inadvertently going into some log system.

    • BearOfaTime@lemm.ee
      link
      fedilink
      arrow-up
      4
      arrow-down
      6
      ·
      1 month ago

      “mistake”

      I call BS. The reviews I’ve gone through for trivial stuff would’ve exposed this.

      This was intentional.

      • HiddenLayer555@lemmy.ml
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        2
        ·
        1 month ago

        Hanlon’s Razor revised: Never attribute to malice what can be attributed to incompetence, except where there is an established pattern of malice.

      • masterspace@lemmy.ca
        link
        fedilink
        English
        arrow-up
        5
        ·
        1 month ago

        Yeah, cause trivial systems are a lot easier to parse and review. At a base level that’s nonsense logic.

        • BearOfaTime@lemm.ee
          link
          fedilink
          arrow-up
          0
          arrow-down
          1
          ·
          1 month ago

          My point being the extensiveness of a review process.

          The more important a system, the more people it impacts, etc, the more extensive the review process.

          Someone chose to ignore this risk. That’s intentional.

          • masterspace@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 month ago

            You quite frankly, don’t know what happened and if you’re confident it’s intentional, all that says is that you’re a grump who likes to complain.