The same threat actor has leaked larger amounts of data from LinkedIn dated 2023. They claim this new data contains 35M lines and is 12 GB uncompressed.

  • @[email protected]
    link
    fedilink
    English
    208 months ago

    I’m not sure what you’re implying here regarding headers? Email is insecure regardless; even when using SMTP with TLS, it’s not like the headers are exposed whereas the body would be encrypted or something.

      • @[email protected]
        link
        fedilink
        English
        118 months ago

        well with PGP, the header is unencrypted

        Is there a single large company that even sends PGP email?

        logging into example.com with the user’s email and that 2fa code is going to be a breeze

        Sure, IF 1. you already have the user’s password, and 2. a new code wouldn’t be required/the previous code invalidated when initiating a new login session?

        Like, I’m not saying that 2FA codes via email is secure, but you’re implying that they are making a security hole via this - which I don’t see.

          • brothershamus
            link
            fedilink
            28 months ago

            I used it. For about 10 minutes. Then I read the help files. Then I searched. Then I used it some more. Then I uninstalled it.

            • @[email protected]
              link
              fedilink
              English
              18 months ago

              Unless you followed by installing gpg… then you failed. There are tons of uses for it, not necessarily encrypting emails (or more precisely, it kind of sucks at encrypting emails).

        • @[email protected]
          link
          fedilink
          English
          18 months ago

          Yeah not following the logic. 2FA via email is insecure. Doesn’t matter where in the email. That person is confused about something.