in reply to Re^7: Perl Monks Userdata leaked?
in thread Perl Monks Userdata leaked?

Why should I?

I see you didn't understand how it works.

Additionally: Would it have been hacked, I'd receive much more spam as I have 1001 (yes. Really one thousand and one) mail addresses registered with my acount.


s$$([},&%#}/&/]+}%&{})*;#$&&s&&$^X.($'^"%]=\&(|?*{%
+.+=%;.#_}\&"^"-+%*).}%:##%}={~=~:.")&e&&s""`$''`"e

Replies are listed 'Best First'.
Re^9: Perl Monks Userdata leaked?
by Anonymous Monk on Nov 30, 2015 at 10:32 UTC
    Are you using HTTPS on perlmonks?

      No, because:

      You have asked Firefox to connect securely to perlmonks.org, but we ca +n't confirm that your connection is secure.

      s$$([},&%#}/&/]+}%&{})*;#$&&s&&$^X.($'^"%]=\&(|?*{%
      +.+=%;.#_}\&"^"-+%*).}%:##%}={~=~:.")&e&&s""`$''`"e

        This is actually a concern... self-signed cert for something like PerlMonks?

        I've purchased and implemented a few certificates in my day, and they didn't seem to be overly expensive. Is there a reason why https://perlmonks.org (or perlmonks.* for that matter) doesn't have a valid one?

        Is this a money issue?