Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even if you don't check the source code to verify that it's harmless, you should assume your password has been compromised and have already changed it anyway. This just lowers the cost of checking the list and could help us learn more about the compromise.


If the hole that let them in hasn't been closed yet, changing the password will make that password vulnerable, right?


LinkedIn said:

> users who have already changed their passwords or created a new account won’t have to worry, as they have recently begun hashing and salting their current password databases.

http://techcrunch.com/2012/06/06/linkedin-speaks-some-of-tho...


"recently"?!?


Yes, it could have been a little earlier but from what it seems, it was before the leak.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: