this post was submitted on 18 Jan 2024
192 points (98.5% liked)

Privacy

29871 readers
1141 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 4 years ago
MODERATORS
 

The Naz.API dataset is a massive collection of 1 billion credentials compiled using credential stuffing lists and data stolen by information-stealing malware.

Credential stuffing lists are collections of login name and password pairs stolen from previous data breaches that are used to breach accounts on other sites.

Information-stealing malware attempts to steal a wide variety of data from an infected computer, including credentials saved in browsers, VPN clients, and FTP clients. This type of malware also attempts to steal SSH keys, credit cards, cookies, browsing history, and cryptocurrency wallets.

all 38 comments
sorted by: hot top controversial new old
[–] [email protected] 75 points 5 months ago (1 children)

A stern reminder that we should all use a password management tool and use unique, unrelated passwords with every service.

[–] [email protected] 46 points 5 months ago (2 children)

And unique email-aliases for bonus points

[–] Narwhalrus 12 points 5 months ago (6 children)

Remind me how to do this, please. I always forget this part...

[–] [email protected] 17 points 5 months ago (1 children)

SimpleLogin and Addy.io are a good start

[–] [email protected] 5 points 5 months ago

You can integrate this with Bitwarden to auto generate email aliases too

[–] adamkempenich 9 points 5 months ago (2 children)

For Gmail users, you can add a plus sign to the end of your email username, and then any set of characters you’d like.

So if your address was [email protected], and wanted an easy-to-remember login for Hot Dog Hut, you could append it in the following way:

[email protected]

[–] [email protected] 3 points 5 months ago (1 children)

That used to be my go-to method but I found it works less and less. Places know the gmail tricks and auto-strip them out of the address.

Started using Proton's Hide-my-email and never going back. It's time to move away from google anyways.

[–] Tangent5280 2 points 5 months ago

Many privacy centric mail companies now offer email aliases and temporary mail ids in built.

[–] [email protected] 1 points 5 months ago

I used to use that approach, but found in the last several years more than half the web sites I use reject email addresses with “+” characters.

I even use several sites that used to take those addresses just fine now reject them. That made me wonder if some common JS package for parsing email addresses got changed.

[–] Bocky 6 points 5 months ago

Duck.com is what I use, I generate a unique email for every website. I even started changing my old logins recently for old accounts

[–] [email protected] 2 points 5 months ago

I agree with doing this, but the main drawback is that you can't easily check all of your unique aliases in HaveIBeenPwned without scripting something and paying for API access.

I have hundreds of unique aliases for my accounts, but no simple way to see when/if the services that use them are breached.

[–] [email protected] 1 points 5 months ago

The free version of Proton Pass is a decent option.

[–] [email protected] 0 points 5 months ago (1 children)
[–] [email protected] 3 points 5 months ago (1 children)

That is not a standard mail feature, it won't work with all mail servers and not all that do have it use + as the separator.

[–] [email protected] 0 points 5 months ago

While it's not formalised in the email specs, support for it is pretty consistent, and only needs to work for whichever provider you use

[–] [email protected] 10 points 5 months ago

I always get funny looks when in person and I give my email address as [email protected]

I used to explain the how's and the why's but now I just say I'm a geek and move along. But if I start getting spam or bullshit to that address best believe I know who fucked up.

[–] [email protected] 14 points 5 months ago (1 children)

Yeah, I got an alert in my email last night about this. Now I have to go through a massive password reset. Fun!

[–] PM_Your_Nudes_Please 15 points 5 months ago (1 children)

Take the opportunity to switch to a password manager, which will allow for unique passwords.

[–] [email protected] 1 points 5 months ago (1 children)

But the issue is that you don't know which of your passwords is compromised

[–] PM_Your_Nudes_Please 1 points 5 months ago (1 children)

Sure you do. Search by username or email address, and it’ll give you a list of compromised sites.

[–] [email protected] 1 points 5 months ago

For Naz.API specifically (at least last I checked) it just returned Naz.API, not what accounts specifically were compromised

[–] [email protected] 4 points 5 months ago* (last edited 5 months ago) (3 children)

So how do we access the list to see what got out?

Edit: https://search.0t.rocks/ has the db

[–] camr_on 11 points 5 months ago (1 children)
[–] deweydecibel 3 points 5 months ago (1 children)

Why on earth should people trust that site?

[–] [email protected] 4 points 5 months ago

Hopefully you're not entering passwords there. If you're just checking by email or username, it doesn't really matter whether they're trustworthy or not

[–] [email protected] 2 points 5 months ago* (last edited 5 months ago)

What's more insane is that some of those passwords in the lists are I still live intrusions that companies haven't acted on, like for example my Dropbox password is there and that's a new password that I just gave them a few months ago before I deleted my account

[–] chaosppe 3 points 5 months ago (1 children)

I've checked the list on mine, those are some really really old passwords.. Must've been a long time ago.

[–] bfg9k 3 points 5 months ago (2 children)

How were you able to search the list? I can't find it anywhere

[–] [email protected] 4 points 5 months ago

Just tell me your username and password and I'll tell you if you've been hacked

[–] chaosppe 1 points 5 months ago* (last edited 5 months ago) (1 children)
[–] bfg9k 2 points 5 months ago

Cheers mate.

Looks like my decision to start using keepass was a good idea, these are all very old passwords

[–] [email protected] 3 points 5 months ago (1 children)

Can someone help me? I was norified by havibeenpwned that some password was exposed in this leak, yet when I search https://search.0t.rocks/ for my email it comes up empty.