Your skill will accomplish what the force of many cannot |
|
PerlMonks |
Re^4: Status of Recent User Information Leakby Argel (Prior) |
on Aug 02, 2009 at 18:37 UTC ( [id://785266]=note: print w/replies, xml ) | Need Help?? |
There seem to be an awful lot of overreactions going on here. Breakins happen from time to time.It's true that break-ins happen but I think a couple things make this different:
I will close with a quote from this blog entry: As a Perl developer, and CPAN author, this is a bit concerning. First, it would be one issue if this were just some random group of people whose passwords had been hacked, but this is a database of tens of thousands of developers, probably most with root access to the machines they write code on, and according to the hackers, many using passwords that are being re-used elsewhere. These are the passwords of developers like Chromatic, Brian D Foy, Andy Lester, engineers at major corporations and government entities, and more. The hackers couldn’t have picked a worse server to crack and expose. I think it's for reasons like these that there has been such a strong reaction. Update 2009-08-06: Looking at the ezine again I can add two more reasons. The hackers specifically stated that they "couldn't resist so many clear text passwords" (paraphrased) and that "several Monks reuse their respective passwords" (paraphrased). That indicates that non-PerlMonk accounts have been accessed. And as previously mentioned, keep in mind the breach occured over two months before it was discovered. Elda Taluta; Sarks Sark; Ark Arks
In Section
Perl Monks Discussion
|
|