The same threat actor has leaked larger amounts of data from LinkedIn dated 2023. They claim this new data contains 35M lines and is 12 GB uncompressed.

  • kungen@feddit.nu
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    1
    ·
    11 months ago

    I’m not sure what you’re implying here regarding headers? Email is insecure regardless; even when using SMTP with TLS, it’s not like the headers are exposed whereas the body would be encrypted or something.

      • kungen@feddit.nu
        link
        fedilink
        English
        arrow-up
        10
        ·
        11 months ago

        well with PGP, the header is unencrypted

        Is there a single large company that even sends PGP email?

        logging into example.com with the user’s email and that 2fa code is going to be a breeze

        Sure, IF 1. you already have the user’s password, and 2. a new code wouldn’t be required/the previous code invalidated when initiating a new login session?

        Like, I’m not saying that 2FA codes via email is secure, but you’re implying that they are making a security hole via this - which I don’t see.

        • locuester@lemmy.zip
          link
          fedilink
          English
          arrow-up
          2
          arrow-down
          1
          ·
          11 months ago

          Yeah not following the logic. 2FA via email is insecure. Doesn’t matter where in the email. That person is confused about something.