I just got the email from haveibeenpwned. F Trello.

  • Petter1@lemm.ee
    link
    fedilink
    English
    arrow-up
    14
    arrow-down
    2
    ·
    10 months ago

    I agree that data security is important, even if it is only email addresses, where many are probably findable in the web anyway. Maybe, the link with the username has some value, but I’d bet only little. In my opinion, harsh penalties are more needed in privacy invasive (in my opinion malware) like google, meta, Amazon etc. are spreading.

    • deadbeef79000@lemmy.nz
      link
      fedilink
      English
      arrow-up
      9
      ·
      10 months ago

      The problem is that this data can be combined with other data. An email address by itself isn’t particularly important but when it’s matched up with names, physical addresses, DoB, SSN, other PII and the network of other services with matching data it becomes very serious.

      It’s never just this breach, it’s every other breach as well. Every breach makes every preceeding breach more effective and more valuable.

        • deadbeef79000@lemmy.nz
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 months ago

          Other breaches do.

          If two breaches have an overlap, e.g. they both contain email address, then they can be joined into a more complete set.

          • aidan@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            arrow-down
            1
            ·
            10 months ago

            Yeah, I don’t think there is much that would be gleamed by combining with this dataset

      • Petter1@lemm.ee
        link
        fedilink
        English
        arrow-up
        1
        arrow-down
        1
        ·
        10 months ago

        Of course, but where are names, physical addresses, DoB, SSN, etc in this dataset? It’s just mail and username

        • deadbeef79000@lemmy.nz
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 months ago

          Other breaches do.

          If two breaches have an overlap, e.g. they both contain email address, then they can be joined into a more complete set.