Discord.io got hacked!

Sdílet
Vložit
  • čas přidán 19. 05. 2024
  • Discord.io is NOT Discord.gg / Discord.com! But this hack / data breach does affect Discord users that may have used Discord.io (yeah it's confusing)
    Discord.io, a website like top.gg and disboard.org that allows you to advertise your server as well as create free vanity invite links, got breached. 760,000 users had their information uploaded to the . This information includes emails, Discord IDs, salted and hashed passwords, and finally your billing information if the conditions are right.
    LINKS
    -----------------------------------------------------------------------------
    KeePass
    keepass.info/
    Bitwarden
    bitwarden.com/
    Proton Pass
    proton.me/pass
    iCloud+
    www.apple.com/ca/icloud/
    CloudFlare Email Routing
    www.cloudflare.com/developer-...
    SOCIALS
    -----------------------------------------------------------------------------
    Discord Server
    / discord
    Twitter
    / notexttospeech
    TIMESTAMPS
    -----------------------------------------------------------------------------
    00:00 - 1. What is Discord.io?
    00:49 - 2. What information was exposed?
    02:50 - 3. What should you do?
    04:40 - 4. How to stay safe(r) from databreaches
    06:57 - 5. How stupid is this?
  • Věda a technologie

Komentáře • 691

  • @NoTextToSpeech
    @NoTextToSpeech  Před 9 měsíci +634

    One reason Discord.io could be holding onto old billing data is for auditing reasons. For example a bot dev told me they are required by law to keep user billing details for 5 years.
    Also, reversing your password from a salted and hashed password is very difficult even if you have a simple password. However I would still change passwords because it's a good practice. Also I forgot to point out that if you use the same password and your email is in the breach, someone could check if your password has been exposed in a different data breach. If it has, they could try to guess your password and get into your other accounts.

    • @bz_zq
      @bz_zq Před 9 měsíci +10

      crazy

    • @cl4pre
      @cl4pre Před 9 měsíci +9

      this is the problem with trusting websites nowadays it's just hard

    • @SillyGIFs
      @SillyGIFs Před 9 měsíci

      :(

    • @preum526
      @preum526 Před 9 měsíci +5

      This is why i have trust issues.

    • @Firelight7118
      @Firelight7118 Před 9 měsíci +3

      Welcome to the internet. Nowhere is safe.

  • @local9
    @local9 Před 9 měsíci +721

    They did well at least to take action, more than most mega corporations.

    • @blinking_dodo
      @blinking_dodo Před 9 měsíci +38

      As far as i can see, they have done it completely right.
      They have handled this issue over a thousand times better than many megacorps did.

    • @poopmaster
      @poopmaster Před 9 měsíci +8

      ​@@blinking_dodothis is because they aren't a mega corporation

    • @ahpjlm
      @ahpjlm Před 9 měsíci

      @@poopmasteryeah, don’t get why they calling discord a mega corp
      Alphabet (Google‘s parent company), Apple, Microsoft, Amazon are mega corps, because they are worth trillions and have several subsidiaries and large market shares

    • @TheJinx64
      @TheJinx64 Před 7 měsíci

      mega corporations do the same thing? im all for bashing the executives but this is just not true

  • @Kozakow
    @Kozakow Před 9 měsíci +309

    He hates discord users, so he became the ultimate discord user.

    • @wiccansubs5031
      @wiccansubs5031 Před 9 měsíci +3

      LMFAOOO

    • @Gondril-L249
      @Gondril-L249 Před 27 dny

      305 likes and only 1 reply?!lemme fix that
      also, yeah that's really funny. the irony

  • @EmmyVR
    @EmmyVR Před 9 měsíci +744

    Hahaha, this combined with discord’s dumb little “Free boosts” thing is gonna cause alts to be wayyy too easy to get lol

    • @maker0824
      @maker0824 Před 9 měsíci +4

      Hopefully the type of people who used that website are the type of people smart enough to not fall for that. Hopefully.

    • @AndriuxDev
      @AndriuxDev Před 9 měsíci +3

      Hahaha, you fool. I HAVE 700 ALTERNATE ACCOUNTS!!! 😈
      /jk

    • @MrEelement
      @MrEelement Před 9 měsíci +2

      @@AndriuxDevme after I figured out to put a + at the end of my email then the account name 😂

    • @CDJAM-webm
      @CDJAM-webm Před 8 měsíci +1

      @@AndriuxDev eeerm its actually 70

  • @CCRandomBN
    @CCRandomBN Před 9 měsíci +558

    Honestly bro you deserve an award for informing us EVERY SINGLE TIME

    • @RammansPizzas
      @RammansPizzas Před 9 měsíci +15

      @@enzoshorts. Says the guy who makes fake YT Shorts content

    • @user-kb9oy9nn2l
      @user-kb9oy9nn2l Před 9 měsíci +2

      @@enzoshorts.why does bro comment shit on every one of his videos
      bro you have no rights your yt channel is lit fake Roblox vids please stfu and go back to adopt me

    • @stromchaser32
      @stromchaser32 Před 9 měsíci +6

      @@enzoshorts. lmao yt shorts creator. irrelevant moment

    • @Midway64
      @Midway64 Před 9 měsíci +7

      @@enzoshorts. Not even the checkmark will save you from invalidating your opinion!

    • @doge_voador
      @doge_voador Před 9 měsíci

      @@enzoshorts. Shorts creator = brainrotten individual

  • @nomoretwitterhandles
    @nomoretwitterhandles Před 9 měsíci +62

    I saw "data breach" and felt worried, but as soon he explained discord,io I realized this has nothing to do with me because I don't use 3rd party discord stuff lol. Thanks for always informing us about these things (and general safety tips, like the password thing).

  • @jinnipers.3931
    @jinnipers.3931 Před 9 měsíci +85

    in his attempt to say he hated discord, he sounded like he came straight from it 😟

    • @AndriuxDev
      @AndriuxDev Před 9 měsíci +4

      Well, it's like they said: *That little boy... is in BIG trouble.*

    • @EdyAlbertoMSGT3
      @EdyAlbertoMSGT3 Před 9 měsíci +2

      He sounded more like a twitter user

  • @itagamineko
    @itagamineko Před 9 měsíci +88

    Generally your data might already have been sold (passwords n stuff) so its best to check a specific site that lists data breaches on websites and change passwords accordingly

    • @20thCY
      @20thCY Před 9 měsíci +1

      I should probably check the site because 760K users mean more likely than not they have my info

    • @officialromanhours
      @officialromanhours Před 9 měsíci +13

      I'd recommend checking "have I been pwned" as soon as they get a copy of the data

    • @20thCY
      @20thCY Před 9 měsíci +1

      @@officialromanhours Oh I will

    • @1boo
      @1boo Před 9 měsíci +1

      as far as i am aware i don't think there are sites that list databreaches with the passwords

    • @20thCY
      @20thCY Před 9 měsíci +1

      @@1boo Even then, most users won't get their passwords leaked during this since most are newer users

  • @brujyyy
    @brujyyy Před 9 měsíci +180

    Btw, for hashed passwords, you can't "reverse engineer" it quite easily as it requires the original password (didn't leak) and salt (that leaked) to check if the hashed password is the same as the stored one. So don't worry about your password.

    • @Qps9v8geiejt
      @Qps9v8geiejt Před 9 měsíci +26

      I would still recommend changing the password tho

    • @zipf
      @zipf Před 9 měsíci +10

      it can still be bruteforced

    • @wedoalittletrolling723
      @wedoalittletrolling723 Před 9 měsíci +46

      @@zipf will take over 10000 years depending on how strong the victim's password is

    • @U20E0
      @U20E0 Před 9 měsíci

      @@wedoalittletrolling723most people have a weak password

    • @susibaka
      @susibaka Před 9 měsíci +2

      Yup, they can't reverse it, that's why it is used

  • @PinkAgaricus
    @PinkAgaricus Před 9 měsíci +11

    I really feel like that person is in their early 20's going into 18+ servers and chats and complaining about it, then subsequently doing this. I feel like as much as he says he hates discord and the people on it, he used it at some point to get angry at users and create a motive to do this breach.

  • @Jennn
    @Jennn Před 9 měsíci +111

    Man you did an amazing job explaining exactly what happened, what everything means. I especially liked your explanation on the salted and hashed passwords. Thank you for this. Great work!

  • @jort93z
    @jort93z Před 9 měsíci +13

    Just in general DONT use the same password on multiple sites, except if you really don't care about the account I guess. There is nothing assuring you the person running the website doesn't simply sell your password.

  • @clout9661
    @clout9661 Před 9 měsíci +101

    Petty people doing petty things, I wish we had some way to find the dudes info and get him arrested for this stuff.

    • @sodicious
      @sodicious Před 9 měsíci +6

      Just send a pipebomb where they host that database breach website

    • @pattyguy
      @pattyguy Před 9 měsíci +27

      @@sodicious well lol breachforums is another honeypot anyways

    • @filipetrujeira3359
      @filipetrujeira3359 Před 9 měsíci +8

      @@pattyguy Since Pom was arrested it became one.

    • @niczvr
      @niczvr Před 9 měsíci

      ​@@filipetrujeira3359quite surprised people here know about pom

    • @UndercoverDog
      @UndercoverDog Před 9 měsíci +1

      ​@@filipetrujeira3359we dont know 100% if it is. Its very likely tho.

  • @fusionsid270
    @fusionsid270 Před 9 měsíci +8

    with salted and hashed passwords it's basically impossible to reverse engineer it. Though what hackers would do it try to brute force it, basically if they have the salt and know the hashing algorithm they can try the most common passwords or combinations and feed it through the hashing algorithm then compare it with the hash produced. The salt is usually stored appended or prepended to the hash so getting the salt won't be difficult. If have a very strong password you shouldn't need to worry much about your password being compromised. Because if your password isn't in a word list or isn't common or short they will have to try every combination eg aa, ab, ac, etc and this quickly adds up. However you should still change it just in case. Especially if you're using the same password on multiple websites.

  • @WASTOIDSUPREME
    @WASTOIDSUPREME Před 9 měsíci +18

    I'm glad I've been juggling 70 different emails for the past 10 years (yes I frequently forget them all the time).

    • @utopes
      @utopes Před 9 měsíci +1

      You have 70 alternative accounts

    • @WASTOIDSUPREME
      @WASTOIDSUPREME Před 9 měsíci

      @@utopes I've been on the internet for a while.

    • @AvidEscaper
      @AvidEscaper Před 8 měsíci

      Do you make robots by any chance?

    • @stanimirborov3765
      @stanimirborov3765 Před 5 měsíci

      I barely wrote on a notepad how many sites ive registerd on... mm ive figured a way for unique passwords not to be wriutten down or forgotten but dont wanna share..well maybe on stanimir borov1 my first utube channel i might release som video of ideas but not sure yet@@utopes

  • @Splarkszter
    @Splarkszter Před 9 měsíci +1

    Thank you for keeping us safe. Much appreciated.

  • @petertrex
    @petertrex Před 9 měsíci +7

    Use password manager, use 2FA, use email aliases. take security measures. like that's only things you can do.
    most people stops at pw manager and 2FA, but this is the very reason you want to use email alias, so you don't have to worry about anything and just shut that one off.

  • @niskicovjek
    @niskicovjek Před 9 měsíci +2

    how do you keep beeing entertaining while teaching us stuff boa?

  • @Herobrain1000
    @Herobrain1000 Před 9 měsíci +1

    GG on 500k you are amazing :))

  • @sinstreams
    @sinstreams Před 9 měsíci +18

    The aliasing service that proton uses (and owns) is simplelogin. Just for those who are curious. 6:15

    • @sinstreams
      @sinstreams Před 9 měsíci +6

      An issue with iCloud+ hide my email is that you can’t email support from that alias email. This might make things harder to manage if you’re trying to contact discord support or whatever support you might need to email using that alias you create. 6:34

  • @SillyGIFs
    @SillyGIFs Před 9 měsíci +23

    No Text To Speech is the best channel about discord I've ever seen, thanks!

  • @Mar_Ten
    @Mar_Ten Před 9 měsíci

    The hashing algorithm is really important to determine if something is safe or not.

  • @dogeln3
    @dogeln3 Před 9 měsíci +4

    You know it's forgettable when all the top comments are generic "always a good day when ntts uploads"

  • @komunich
    @komunich Před 9 měsíci +5

    Phew.. i felt like im about to lose all of my accounts but ive been wrong. thanks for telling us!

  • @lisaruhm6681
    @lisaruhm6681 Před 9 měsíci +3

    Note for billing adresses, country dependant, a company has to keep all its money transactions for 5+ years.

    • @denis2381
      @denis2381 Před 9 měsíci

      Yeah in my country it is 7 years

  • @abcdefgh1795
    @abcdefgh1795 Před 9 měsíci +68

    always a good day when ntts uploads

    • @Coltonfr5
      @Coltonfr5 Před 9 měsíci +1

      lmao

    • @uglen7420
      @uglen7420 Před 9 měsíci +1

      how do these shitty comments still get likes

    • @pomurain
      @pomurain Před 9 měsíci +6

      what in the spam bot is this message

    • @olek0
      @olek0 Před 9 měsíci

      alswyahsn agopsdkda day wehn ntns ahuopad;ls

    • @CharlieDennisonUrmom
      @CharlieDennisonUrmom Před 9 měsíci +1

      Agree

  • @nateholden7598
    @nateholden7598 Před 9 měsíci +1

    I usually use long and complex passwords for every app/website and different emails. I suggest you use similar characters such as L and i "lI" or O0 ECT. And I tend to make my passwords stupidly long. We're talking at least-
    What?
    10 or 15 characters?
    And maybe even 40 for some.
    With a password that's long and has a lot of characters that look alike, 2FA, And a different Email for EVERYTHING. That's about as secure as you can get to my knowledge.
    Of course me having anxiety I still question how Secure my stuff is and keep making my passwords longer and more complex.

  • @CLRBLNDN
    @CLRBLNDN Před 9 měsíci

    Just tried to join a server and it wanted me to add a bot that would join servers for me. Thanks man

  • @nebuloxxx
    @nebuloxxx Před 9 měsíci

    Loving these videos!

  • @gjorgix3224
    @gjorgix3224 Před 9 měsíci +2

    What is the folder tabs thing you have in your browser? I've seen it in your videos and would love to use it.

    • @supernovaw39
      @supernovaw39 Před 9 měsíci +4

      It's built into Chome and any Chromium-based browsers (Edge, Opera, Brave, etc.). You can right click any tab and "Add tab to group." You can pick colours and names for them

    • @gjorgix3224
      @gjorgix3224 Před 9 měsíci

      @@supernovaw39 Thanks, I have been using a chromium browser for like 10 years and somehow I've never realised this

  • @Wither_Strike
    @Wither_Strike Před 9 měsíci

    Hash's are generally pretty safe as passwodd storing methods go. Its not impossible to crack, but generally the methodology would be to figure out what the hashing algorithm was, generate a wordlist that might contain the password needed, and hashing each of those passwords using the hashing algorithm and seeing if the hashs match. Salting a hash greatly helps, but people have cracked salted hash's before. Im too new to hacking to know how. Still a good idea to change your password, but also good to know that this is much better than them storing your password in plaintext, aka english

    • @HiHelloHi
      @HiHelloHi Před 9 měsíci

      Since salt should be unique to each account, you can't just easily use a precomputed table of hashes of common passwords to look for collisions. This means for each account you wish to crack, you'd have to recalculate hash(guess|salt) for each possible password you want to test for a collision. Modern hashing algorithms have a very low collision rate too.

    • @Wither_Strike
      @Wither_Strike Před 9 měsíci

      @@HiHelloHi i think thats a bit too high end language for me lol. this is why i try to do as little as possible with hashes lol

    • @HiHelloHi
      @HiHelloHi Před 9 měsíci

      @@Wither_Strike collisions are just when a different password hashes into the same digest (the output of the hash function) as the actual password. That is to say: hash(A) equals hash(B) where A and B are not the same password. This is due to the fact that hashes are compression functions, meaning they condense a number of character to the same length of hash for each input string of letters. A table of hash values is just a means to store the outputs of hashing commonly leaked passwords so that you don't compute them yourself. Salt makes it so you have to re-compute this table

  • @agentgato9854
    @agentgato9854 Před 9 měsíci

    for differenting passwords i wold use an algorithm for the password containing some static elements combined with some variable characters that involve the websites middle 3 characters moved 1 right and 3 down on the qwerty keyboard

  • @pongo-7111
    @pongo-7111 Před 9 měsíci +1

    on email forwarding anonaddy is pretty good but some companies have started to blacklist using forwarding/relay alias so you might need a backup or 2nd email regardless

    • @Wilker_uwu
      @Wilker_uwu Před 9 měsíci

      there's STILL websites that adopts whitelisting of email domains instead which is bs

    • @catuaa
      @catuaa Před 9 měsíci

      just use skiff and be happy

    • @erikkonstas
      @erikkonstas Před 9 měsíci +1

      What you're describing is unfortunately a cat-and-mouse game; relays continually create aliases, and the other companies continually hunt them down.

  • @Check_001
    @Check_001 Před 9 měsíci +22

    That's why I made a bunch of measures to protect my useless discord account, even two of them.. It's a funny relieving feeling when having so much protection that breaking it would require a ton of efforts even after an exposed password
    Like, nobody would even dare (after entering it) to guess a 6 digit key that is re-generated (in other connected authentication app) every 30 seconds to pass through. Pure bliss.
    Wish mode people used that more often

    • @dashdashdash_
      @dashdashdash_ Před 9 měsíci +4

      Still doesn't mean there isn't a CVE that effects your router and can infect your machine via improper software or another exploit, from there cookie based attacks can be performed, rendering your protections null.

    • @Check_001
      @Check_001 Před 9 měsíci +6

      @@dashdashdash_ I'm not an expert but it seems like something rather targeted and what's definitely not going to happen to random weirdo from the internet .
      Also what affects router sounds like something that should be quite local to be relevant, proper people could tell better.
      Whatever anyways, what I say is to improve common protection of your account, and replying by random "tHaT iS nOt gOiNg tO sAvE yOu as there is " is lame you know.
      Though you can of course not use any protection then, if that's what you ultimately tried to say.

    • @erikkonstas
      @erikkonstas Před 9 měsíci +2

      @@Check_001 It doesn't have to be targeted, that's why IP grabbers should scare you legitimately despite people saying "your IP isn't private blah blah"; the problem is *who* has your IP address! Also, router firmware updates are not always a thing.

    • @Check_001
      @Check_001 Před 9 měsíci +4

      @@erikkonstas Again I hear only .
      I don't care about it and you all miss my main point. Use the damn protection, even if it's not going to save you from the airplane crush or end of the world. Unless you want to advocate against *this,* that's 0 worth of argument.

    • @erikkonstas
      @erikkonstas Před 9 měsíci +3

      ​@@Check_001You're really ignoring the danger here, whilst at the same time advocating for having protection measures in place...

  • @xE92vD
    @xE92vD Před 9 měsíci +1

    Once passkeys are supported in Discord, these scams should be no longer effective.

  • @ZellieOwO
    @ZellieOwO Před 9 měsíci +1

    careful with breachforums, those guys are nuts lol

  • @joogled1839
    @joogled1839 Před 9 měsíci

    i clicked on this because i thought i had USED the site before. so glad to know it only affects those who made an account on there. my prayers go out to you poor guys.

  • @th0master
    @th0master Před 9 měsíci

    5:10 personally I just use the password manager that comes with iCloud, works great on your Apple devices, but there are also extensions for Chrome and Firefox

  • @hadesbutyoutube
    @hadesbutyoutube Před 9 měsíci

    iCloud+ also lets you do the custom email addresses if you're already using that.

  • @JessicaFEREM
    @JessicaFEREM Před 9 měsíci

    Good on you for using FOSS software like bit warden

  • @jordanwardle11
    @jordanwardle11 Před 9 měsíci

    just an fyi, a data breach is a case of when and not if. plus, you will only know about it only if the company decides to reveal it. assume that EVERYTHING is breached

  • @terbospeed
    @terbospeed Před 9 měsíci +5

    I have to wonder what circles this person was running in to think that half of discord is pedocontent... I've used it for several years and not really run into it, meanwhile on reddit, twitter, and facebook, 4chan.. the opposite is true.

    • @scarletrevolt
      @scarletrevolt Před 4 měsíci

      Oh buddy, you would be surprised on how much pedo content is in Discord. Not just that, but grooming, zoos, etc. Like just cause you didn't see it doesn't mean it ain't out there.

  • @bomboi8222
    @bomboi8222 Před 9 měsíci +3

    at this point even discord got hacked in discord

  • @Woutundra2
    @Woutundra2 Před 9 měsíci

    this is the prime reason why i use discord as is because i sure as hell don't want people getting my private info cuz every single time something goes to shit with it

  • @hbubli
    @hbubli Před 9 měsíci

    About the single email for every thing, theres still more nerdiness than cloudflare email routing. Running a selfhosted email server and then creating aliases there (definitely did not do that nope no way ;) )

  • @_lun4r_
    @_lun4r_ Před 9 měsíci

    good to know that i use a different custom vanity link service, and not this one
    i didn't get hacked

  • @bandiddums
    @bandiddums Před 9 měsíci +9

    About email relays I watched a video about that from Thiojoe and there is a feature where you put some special annotation in your existing email to make it. So it's the same email but with a different address. Though I do remember that he said the feature is rarely supported on websites and all you have to do to get the original address is to just remove the annotation so it's pretty easily bypassed

    • @robertplayz9157
      @robertplayz9157 Před 9 měsíci +2

      It's by putting a + and any string before the @ in the address. However in my opinion that's only good to counter email marketing/spam.

    • @Milenakos
      @Milenakos Před 9 měsíci

      @@robertplayz9157 indeed, anyone can remove + part and get your normal email with no issues

    • @thatdude9091
      @thatdude9091 Před 9 měsíci

      And it can be ignored (they just remove the +)

    • @robertplayz9157
      @robertplayz9157 Před 9 měsíci

      @@thatdude9091 telemarketers have many addresses to deal with, and their time for the money is precious to them, so they don't filter or sort, they just send.

    • @thatdude9091
      @thatdude9091 Před 9 měsíci

      @@robertplayz9157 it takes a very simple filter to remove +

  • @Akab
    @Akab Před 9 měsíci

    Thing is, with a web space and a domain you can get a fully custom invite link for less then 1,50 month

  • @zeratax
    @zeratax Před 9 měsíci +4

    simply reverse engineering a salted and hashed password is some nation state kinda work, not impossible but insanely difficult (if they followed best practices that is lol)

    • @erikkonstas
      @erikkonstas Před 9 měsíci +2

      I mean, even if the salt is a constant the hackers would still have a harder time...

  • @wasabitofu9491
    @wasabitofu9491 Před 9 měsíci

    the nerd voice at the end THAT was a beautiful performance.

  • @neock
    @neock Před 9 měsíci +1

    as for password managers... using them is just as big a risk. because now, instead of needing to know one password for each account, they need to know one password... and have not only your account passwords for every site, but every username or login name you use for those sites.

    • @schmid1.079
      @schmid1.079 Před 9 měsíci

      But they would need to get to that password, which is kept by a service specifically made for keeping that one password safe.
      Its a lot safer than reusing the same password or using insecure ones.
      If you can remember dozens of complex passwords from memory, sure thats safer. But thats just not how things work in reality.

  • @Jellae
    @Jellae Před 9 měsíci +5

    I love it when trash human beings try and claim they are doing something for justice just to cover up their crimes. Like kid is calling everyone on an app a pedophile and thinks he is doing justice by SELLING their data 💀 This guy made 2 wrongs (1: Trying to make bank. 2: Calling an entire user base pedophiles) for 1 wrong (there are indeed SOME pedophiles)

  • @oreooooo999
    @oreooooo999 Před 9 měsíci

    You did a good job with this vid, but 2fa isn’t great if u get sim swapped etc

  • @LushDaBush
    @LushDaBush Před 9 měsíci

    There are times in my life I'm happy i didn't scoop around stuff like this (my dad's pc survived me trying to download free minecraft over the course of half a decade)

  • @AsadWhom
    @AsadWhom Před 9 měsíci +37

    This is why you shouldn't trust these websites

    • @Lexipherous
      @Lexipherous Před 9 měsíci +13

      Reminder that if it's on the internet, it's a target. Digital security is all about making it as inconvenient as possible for any attacker. Imagine a bike padlock. You can put 10 padlocks on it which would make most thieves either go after something else or not at all. But if someone really wants your bike, they'll bring a boltcutter.

    • @ModxVoldHunter
      @ModxVoldHunter Před 9 měsíci +4

      @@Lexipherous that is true, for example if someone really really hates you, they'll try to shut down anything you own by either hacking it or blackmailing you. but there is other ways too.

    • @20thCY
      @20thCY Před 9 měsíci +2

      I hate Discord's stupid auto generated links though so that's why I used it in the first place

    • @Rainbow.Quartz
      @Rainbow.Quartz Před 9 měsíci +1

      My wifi is too bad to watch the whole video, so I’m good if I never even touched this website? I mean I’d guess so but better safe than sorry.

  • @Davide0033
    @Davide0033 Před 9 měsíci

    to be fair, if they aren't using some preistoric hashing system brute force is a quite dumb way to steal a password.

  • @pipo0730
    @pipo0730 Před 9 měsíci

    Can you do a video on the schlatt community discord one of the most toxic servers i know

  • @veronicarodrigues236
    @veronicarodrigues236 Před 9 měsíci

    Me who doesn't know this existed 💀
    Thanks for the information

  • @began2
    @began2 Před 9 měsíci +8

    That was impressive but it was just protesting discord

  • @klier8737
    @klier8737 Před 9 měsíci +1

    you cant reverse engineer a hashing algorithm practically, technically yes but its extremely difficult and time consuming, they would rather bruteforce the hash and try every combination and check if the two hashes match

    • @denis2381
      @denis2381 Před 9 měsíci

      Today yes, in future? I don't think so

    • @klier8737
      @klier8737 Před 9 měsíci

      @@denis2381 that is true, hardware is getting more powerful and powerful and quandtum computing is a big deal for cryptography but a lot of algorithms are being made now to be extra secure

  • @preum526
    @preum526 Před 9 měsíci

    Just makes my day better 🍵.

  • @rijaja
    @rijaja Před 9 měsíci +5

    "Discord is full of creeps" lmao like 99% of the students at my school are on our discord server. I think the collateral damage is a bit high on this one. If "getting revenge on creeps" was the goal, that is.

  • @gir0fa
    @gir0fa Před 9 měsíci

    LOVE THE CONTENT ❤❤

  • @YeensWrath
    @YeensWrath Před 9 měsíci

    A good trick.. is to write down your password on a piece of paper and hide it somewhere only you know where to find them. This way, you keep track of multiple passwords without needing to rely on 3rd party websites

    • @anomaly_echelon7994
      @anomaly_echelon7994 Před 9 měsíci

      if that's the case, someone you know irl can have access to all your accounts if they get hold of the piece of paper and if you don't back up that data to other piece of paper and you loose it, you loose access to your accounts. I'd say use a open source password manager and try to back up it's data and save it in a few encrypted USB flash drives where only you know the password to the decryption key.

  • @cool_clipzz
    @cool_clipzz Před 9 měsíci +3

    Thank you for warning us. LEGEND.

  • @fadefun6728
    @fadefun6728 Před 9 měsíci

    Are you telling someone from breach forms a? used a sequel? vulnerable. because I'm pretty sure they're using my SQL for their database.

  • @aryantiwari7105
    @aryantiwari7105 Před 9 měsíci

    I have cloudfare email routing setup, all i can say is its perfect and fairly easy to set up

  • @madara2887
    @madara2887 Před 9 měsíci

    What browser is that? The tabs look cool

  • @SilverBulletKR
    @SilverBulletKR Před 9 měsíci

    problem with gmail is that you can only make a certain amount of emails with 1 single phone number. And every gmail requires a phone number each which is annoying

  • @d-land7775
    @d-land7775 Před 9 měsíci

    It's not about the money it's about sending a message

  • @KleinerKokiri
    @KleinerKokiri Před 9 měsíci

    That hacker sounds like he is projecting.

  • @thienviet3429
    @thienviet3429 Před 9 měsíci

    For e-mail address: Just use an alias. If they spam, then delete your alias.

  • @ahmedmustafa1236
    @ahmedmustafa1236 Před 9 měsíci +26

    i feel bad for the people in discord io

    • @NotBajan
      @NotBajan Před 9 měsíci

      Me too

    • @TabbyEgg312
      @TabbyEgg312 Před 9 měsíci +1

      i dont even know if my account was even affected at all

    • @dashdashdash_
      @dashdashdash_ Před 9 měsíci

      I don't it was a weird site anyway they should have read the data ToS and privs before they clicked.

    • @TeamGalactic-Cyrus
      @TeamGalactic-Cyrus Před 9 měsíci

      @@dashdashdash_ wdym

    • @20thCY
      @20thCY Před 9 měsíci +1

      ​@@dashdashdash_um it wasn't the site themselves it was people who breached it

  • @hydratedray
    @hydratedray Před 9 měsíci

    at least they took some accountability

  • @AkaneEndespeakdevReal
    @AkaneEndespeakdevReal Před 9 měsíci

    Firefox relay is good if you don’t want to use apple or Dont have a domain

  • @Muffiz_
    @Muffiz_ Před 9 měsíci +12

    ntts is always entertaining somehow

  • @Bartek2OO219
    @Bartek2OO219 Před 9 měsíci

    "Reverse engineer your password" yes they will use thousands of dollars worth of computing power just to crack salted passwords of discord kids

  • @pzyko21
    @pzyko21 Před 9 měsíci +2

    to the 2fa "this will protect your account if you use the same password for everything" is only partially right, if your email ALSO uses that PW and has no own 2fa, it can be disabled within a jiffy.
    so remember², also put on 2fa on your email.

  • @Refreezerator
    @Refreezerator Před 9 měsíci

    well, can’t wait to get spam emails now!

  • @NKillBruh
    @NKillBruh Před 9 měsíci

    I wonder if it has been added to HIBP's database.

    • @hi-kt3qr
      @hi-kt3qr Před 9 měsíci

      unlikely they need to get their hands on the database first

  • @That_Puppet
    @That_Puppet Před 9 měsíci +1

    1:09 i heard that smoke alarm beep

  • @LDTV22OfficialChannel
    @LDTV22OfficialChannel Před 9 měsíci

    If it's old, you don't need to worry. He still won't make money off the breach anyways.

  • @ToughFighterGuy
    @ToughFighterGuy Před 9 měsíci

    Definitely, I 100% agree with this thought out logic.

  • @FinnishEmpire
    @FinnishEmpire Před 9 měsíci +1

    8:24 bro actually said that 💀

  • @WildFyr
    @WildFyr Před 9 měsíci

    "enable 2fa" Discord makes want to turn it off because as someoke who makes bots i hate the fact that i need to enter a 2FA code not only log into the developer portal, but also need to enter it again to generate a bot token (because they no longer let you see it after you create the bot for some reason, you habe to regen it) and same for the client secret... Like Discord i just created the bot let me see this stuff. Thats 3 times i had to enter a 2FA code all to do the same thing

  • @OneAndOnlyZekePolaris
    @OneAndOnlyZekePolaris Před 9 měsíci +2

    Tell websites to allow all characters so we can truly secure our accounts. Not every hacker has a keyboard that can use all characters so if you use one of them they can't hack into it. Problem solved.

    • @softandwet7584
      @softandwet7584 Před 9 měsíci +2

      Settings > Language options > Change Keyboard > (insert Region which contains said characters)
      Win + CTRL + O
      Your solution bypassed

    • @OneAndOnlyZekePolaris
      @OneAndOnlyZekePolaris Před 9 měsíci

      @@softandwet7584 The steps you provided does not match Windows 10 settings.

    • @OneAndOnlyZekePolaris
      @OneAndOnlyZekePolaris Před 9 měsíci

      @@softandwet7584 Also that has nothing to do with the characters I was talking about. The ones I am talking about can not even be typed even with OSK and downloading other languages that are already installed to the system. The characters I am talking about can only be typed by those that has the keyboard. Not everyone has this only gaming computers do. A hacker would never use a gaming computer for hacks. Note not all gaming computers has this but still at least you are protected from this type of hack. Maybe allow characters that can't even be seen that way at least you know the password still and it will take them years to figure out why they can't log in even though they typed it correctly.

  • @moneycat105
    @moneycat105 Před 9 měsíci +1

    I use apples contacts app as a password manager.

  • @samuelbi11
    @samuelbi11 Před 9 měsíci

    content fast asf because of attention spam, nice video!

  • @jayster3.0
    @jayster3.0 Před 9 měsíci +1

    You sound like the guy from the CZcams channel CinemaSins, lmao.

  • @mainfalsedata
    @mainfalsedata Před 9 měsíci

    R.I.P Users

  • @mmkanashiro
    @mmkanashiro Před 9 měsíci

    4:36 the guy watching the video be like:
    well... im fucked

  • @gummyboiyt
    @gummyboiyt Před 9 měsíci

    Damn bro, a data breach on my birthday.

  • @kipchickensout
    @kipchickensout Před 9 měsíci

    also who knows if they just appended the hash or also prefixed it or did some bit magic with it?

  • @Razgar_Voxel
    @Razgar_Voxel Před 9 měsíci

    This would explain the 2 factor message i got the few days ago sending me my code. i changed my password anyhow for my discord lol.

  • @ari_archer
    @ari_archer Před měsícem

    02:50 No. They cannot figure out the original password - all hashing functions are made "equal" (as in all of them are one-way functions which are theoretically impossible to reverse, if you need a two-way function - look into cryptographic algorithms such as AES (most likely in GCM mode for passwords), RSA, ChaCha20, etc.). What makes a hashing function "insecure" are mainly collision attacks (basically two differing inputs producing the same hash, due to for example insecure computation or a small hash size) and "rainbow table attacks" (which in this case isn't well applicable because it was salted, which means the output of the hashing function output is completely different, and I assume dio used at least like a 32 byte salt (256 bits), which should be enough for most cases to avoid the pre-computation attacks) which is just like an index of pre-hashed common inputs.
    And I doubt dio was using an "insecure" hashing algorithm like MD5, it was most likely some SHA2 (or SHA3)-family algorithms (such as SHA256, SHA512, SHA3-512, ...), or if dio was smart - Argon2.
    Furthermore, although I know things about cryptography and hashing, I don't know anything about dio, but I assume they have TOTP/2FA, and if they do - I truly hope its users were aware enough to set it up in time.
    I wouldn't call this an extremely sensitive data breach, but it is uncanny, and the fact that s small portion of users got some of their billing address leaked is sad, considering that identifiable information such as their discord username and email addresses got leaked with it. All this could lead to pretty nasty stalking cases, doxxing, and spear phishing attacks :/

  • @IForgorAboutMay2007
    @IForgorAboutMay2007 Před 9 měsíci

    I never heard of this site until now 💀

  • @TomerGamerTV
    @TomerGamerTV Před 9 měsíci

    Good password manager recommendations

  • @qjo_maste
    @qjo_maste Před 9 měsíci

    also witch browser are you using it look cool

  • @tommyIT
    @tommyIT Před 9 měsíci

    Somebody already wrote that you can't get the password if its hashed with some exceptions (known hashes if the password is really easy).

    • @EvilNeuro
      @EvilNeuro Před 9 měsíci

      Do you want to take that risk?
      Use different passwords.

    • @hacksolo857
      @hacksolo857 Před 9 měsíci

      But it makes it easier to crack

    • @EvilNeuro
      @EvilNeuro Před 9 měsíci

      @@hacksolo857 my dude the difference is your password of “star!” Being saved as “star!” That’s without a hash, Or being saved as “cb384499d9041a698a0acb8b70b7818b” that is with a hash, specifically a md5 hash (not salted)

    • @tommyIT
      @tommyIT Před 9 měsíci

      @@EvilNeuro i am not saying you shouldnt use different passwords thats a different story

    • @EvilNeuro
      @EvilNeuro Před 9 měsíci

      @@tommyIT ok.,, just be careful please

  • @ManBananaCat
    @ManBananaCat Před 9 měsíci

    2:53 i was really expecting an ad there