• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 08:30
CET 14:30
KST 22:30
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
TL.net Map Contest #21: Winners10Intel X Team Liquid Seoul event: Showmatches and Meet the Pros10[ASL20] Finals Preview: Arrival13TL.net Map Contest #21: Voting12[ASL20] Ro4 Preview: Descent11
Community News
StarCraft, SC2, HotS, WC3, Returning to Blizzcon!33$5,000+ WardiTV 2025 Championship6[BSL21] RO32 Group Stage4Weekly Cups (Oct 26-Nov 2): Liquid, Clem, Solar win; LAN in Philly2Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win10
StarCraft 2
General
Mech is the composition that needs teleportation t TL.net Map Contest #21: Winners Weekly Cups (Oct 20-26): MaxPax, Clem, Creator win RotterdaM "Serral is the GOAT, and it's not close" 5.0.15 Patch Balance Hotfix (2025-10-8)
Tourneys
Constellation Cup - Main Event - Stellar Fest $5,000+ WardiTV 2025 Championship Sparkling Tuna Cup - Weekly Open Tournament Merivale 8 Open - LAN - Stellar Fest Sea Duckling Open (Global, Bronze-Diamond)
Strategy
Custom Maps
Map Editor closed ?
External Content
Mutation # 498 Wheel of Misfortune|Cradle of Death Mutation # 497 Battle Haredened Mutation # 496 Endless Infection Mutation # 495 Rest In Peace
Brood War
General
[ASL20] Ask the mapmakers — Drop your questions BW General Discussion [BSL21] RO32 Group Stage BGH Auto Balance -> http://bghmmr.eu/ SnOw's ASL S20 Finals Review
Tourneys
[Megathread] Daily Proleagues [ASL20] Grand Finals [BSL21] RO32 Group B - Sunday 21:00 CET [BSL21] RO32 Group A - Saturday 21:00 CET
Strategy
Current Meta PvZ map balance How to stay on top of macro? Soma's 9 hatch build from ASL Game 2
Other Games
General Games
Nintendo Switch Thread Stormgate/Frost Giant Megathread Path of Exile Should offensive tower rushing be viable in RTS games? Dawn of War IV
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread SPIRED by.ASL Mafia {211640}
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread Things Aren’t Peaceful in Palestine YouTube Thread Dating: How's your luck?
Fan Clubs
White-Ra Fan Club The herO Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread Movie Discussion! Korean Music Discussion Series you have seen recently...
Sports
2024 - 2026 Football Thread NBA General Discussion MLB/Baseball 2023 TeamLiquid Health and Fitness Initiative For 2023 Formula 1 Discussion
World Cup 2022
Tech Support
SC2 Client Relocalization [Change SC2 Language] Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread
TL Community
The Automated Ban List Recent Gifted Posts
Blogs
Coffee x Performance in Espo…
TrAiDoS
Saturation point
Uldridge
DnB/metal remix FFO Mick Go…
ImbaTosS
Why we need SC3
Hildegard
Reality "theory" prov…
perfectspheres
Our Last Hope in th…
KrillinFromwales
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1487 users

Blizzard Security Breach - Page 12

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 10 11 12 13 14 23 Next All
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 10 2012 04:13 GMT
#221
On August 10 2012 13:07 Zato-1 wrote:
Show nested quote +
On August 10 2012 12:39 zhurai wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core

Actually, if you're serious about cracking a large number of passwords then you don't care so much about your processor, you'll get a high-end graphics card to do the brunt of the work because they have orders of magnitude more computing power for this purpose. Also, in its estimate, that site makes the rather huge (and probably incorrect) assumption that the programs hackers use will be sequentially trying completely random sequences of characters, when there are substantially more efficient ways to crack more than enough bad passwords to make it worth your while.

I know. I'm just saying that site is unrealistic which probably is a simulating a computer that can only work on one thing at a time rather than e.g. multithreading cracking, using dictionary tables, etc.

(read: sarcasm)
Twitter: @zhurai | Site: http://zhurai.com
sudosu
Profile Joined October 2011
France120 Posts
August 10 2012 04:32 GMT
#222
On August 10 2012 13:13 zhurai wrote:
Show nested quote +
On August 10 2012 13:07 Zato-1 wrote:
On August 10 2012 12:39 zhurai wrote:
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.

maybe if they try cracking it on one computer with a single core

Actually, if you're serious about cracking a large number of passwords then you don't care so much about your processor, you'll get a high-end graphics card to do the brunt of the work because they have orders of magnitude more computing power for this purpose. Also, in its estimate, that site makes the rather huge (and probably incorrect) assumption that the programs hackers use will be sequentially trying completely random sequences of characters, when there are substantially more efficient ways to crack more than enough bad passwords to make it worth your while.

I know. I'm just saying that site is unrealistic which probably is a simulating a computer that can only work on one thing at a time rather than e.g. multithreading cracking, using dictionary tables, etc.

(read: sarcasm)



Actually the chinese with their supercalculator may be able to break his password in a few months xD (can't remember how many units of 16 cores they have).
Droom
Profile Joined May 2009
23 Posts
Last Edited: 2012-08-10 04:38:25
August 10 2012 04:37 GMT
#223
So now I know why " FedExe delivery failure" and "Penis Enlargment" got through my spam.

Edit: Changing password now
Clazziquai10
Profile Blog Joined August 2011
Singapore1949 Posts
August 10 2012 04:41 GMT
#224
And blizzard screws up again. How surprising.
Chargelot
Profile Blog Joined December 2010
2275 Posts
Last Edited: 2012-08-10 04:52:50
August 10 2012 04:52 GMT
#225
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

No. You're wrong. When you're a multibillion dollar corporation which operates with user information online, there are people constantly targeting you.

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen.

So long as locks continue to have the singular flaw of allowing authorized users to bypass their security nothing which is kept behind locked doors will ever be completely safe. Imagine the number of attempts they have halted. Imagine how many times people have tried to access this data. Considering the frequency of their success, I would say Blizzard is doing a damned good job.
if (post == "stupid") { document.getElementById('post').style.display = 'none'; }
Parcelleus
Profile Joined January 2011
Australia1662 Posts
August 10 2012 04:55 GMT
#226
Thanks for the speedy heads-up BliZZ.

Password changed.
*burp*
zhurai
Profile Blog Joined September 2010
United States5660 Posts
August 10 2012 04:58 GMT
#227
On August 10 2012 13:52 Chargelot wrote:
Show nested quote +
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

No. You're wrong. When you're a multibillion dollar corporation which operates with user information online, there are people constantly targeting you.

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen.

So long as locks continue to have the singular flaw of allowing authorized users to bypass their security nothing which is kept behind locked doors will ever be completely safe. Imagine the number of attempts they have halted. Imagine how many times people have tried to access this data. Considering the frequency of their success, I would say Blizzard is doing a damned good job.

regarding security. never assume you're 100% safe.
Twitter: @zhurai | Site: http://zhurai.com
bokchoi
Profile Blog Joined March 2010
Korea (South)9498 Posts
August 10 2012 05:02 GMT
#228
Good thing I never had any credit card information associated with my US battle.net account.
Greggle
Profile Joined June 2010
United States1131 Posts
August 10 2012 05:03 GMT
#229
On August 10 2012 13:41 Clazziquai10 wrote:
And blizzard screws up again. How surprising.

In the past few years this has happened to far bigger names and with far worse outcomes. Nobody is safe from this.
Life is too short to take it seriously.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 05:09 GMT
#230
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")

Cryptographically scrambled passwords aren't unbreakable, it just takes too much computational effort to unscramble the entire database. Cherry picked accounts can still easily be unscrambled.

It effectively means they have your password if they're willing to devote effort to acquiring it. If there are other places of significance where you use the same password and your identity is traceable through your account data, change those passwords as well.

So if you use your blizzard password as your bank password, and your email is basically your real name, change that shit.
fer
Profile Joined November 2010
Canada375 Posts
August 10 2012 05:11 GMT
#231
On August 10 2012 07:38 Probe1 wrote:
So change your passwords. Got it.

(Before anyone says "Oh no Probe u sux at reading", cryptographically scrambled versions.. do you trust your account and information on that? Do you?")


Yes, trust math
WellPlayed.org <3
Shield
Profile Blog Joined August 2009
Bulgaria4824 Posts
August 10 2012 05:11 GMT
#232
Oh god... I know Blizzard are lazy, but now not secure enough...? -.-
Prophanity
Profile Joined January 2012
United States165 Posts
August 10 2012 05:27 GMT
#233
On August 10 2012 14:11 darkness wrote:
Oh god... I know Blizzard are lazy, but now not secure enough...? -.-


People can break into government agencies and you think it surprising that a videogame manufacturer isn't foolproof?

Welcome to the internet - nothing is ever truly safe.
Firenza
Profile Joined October 2011
United States51 Posts
August 10 2012 05:29 GMT
#234
This thread has been really insightful. Thanks to all the folks dropping some real security knowledge.

Good advice for sex and passwords: Don't fool around with ridiculous characters. Hash makes it better. Size matters.
Xapti
Profile Joined April 2010
Canada2473 Posts
August 10 2012 05:32 GMT
#235
I felt like Battle.net e-mails were leaked long before this. I kinda doubt it's a coincidence when I start getting blizzard-game-related spam mail a while after using the e-mail for a battle.net account.
"Then he told me to tell you that he wouldn't piss on you if you were on fire" — "Well, you tell him that I said that I wouldn't piss on him if he was on Jeopardy!"
EvanED
Profile Joined October 2009
United States111 Posts
Last Edited: 2012-08-10 05:39:03
August 10 2012 05:37 GMT
#236
On August 10 2012 13:12 sudosu wrote:
"cryptographically scrambled versions"
"each password would have to be deciphered individually"

Andwhy the hell are the passwords ciphered and not hashed ?

I'd guess that's what Blizzard actually does, and their webpage has simplified the description so that people who haven't gone through a CS undergrad know what it means. :-) (OK, that's an exgeration a bit, but I still think it's mostly true.)

Besides, the first quote is perfectly applicable to the hashing scenario anyway (and in fact the weird wording of the first quote just makes me more sure of my guess).

There is absolutely no reason to store ciphered passwords because there is even less reason to deciphered a password.

(The following isn't really meant to say you're wrong per se -- and definitely not in this scenario -- just to add some additional information that the above isn't some inviolable rule.)

So it's pretty inapplicable to the WWW scenario, but by my understanding there is actually one reason that storing passwords in encrypted (and not hashed) form is a fairly legitimate tactic: it allows mutual authentication without a trusted third-party.

Alice wants to talk to Bob, so Alice picks a random secret key to use in future messages (the "session key") and encrypts that key with her password, and forwards it off to Bob, along with "I'm Alice!" in plaintext. Bob looks up Alice's password (decrypting it if necessary), uses that to decrypt the session key. Now both Alice and Bob know the session key, and no one else can subject to the strength of Alice's password. They can then handshake to make sure they have the same session key -- if they do, then mutual authentication is successful. Mallory can't mimic Alice because he can't encrypt the session key without Alice's password, nor can he mimic Bob because he can't decrypt it for the same reason.

My understanding (though this is weak and stuff I learned quite a long time ago so I could be wrong) is this idea is behind Kerberos. Kerberos adds a bunch of additional layers (and protections against other attacks like replays), and calls the "password" the "password hash" -- but it's basically how it works. (What I mean by that password vs password hash comment is that everything you need to do to authenticate yourself in Kerberos -- if I'm right -- you can do with the password hash. The extra hash step bascially provides no protection except that an attacker would have a hard time reversing to the actual input from the user to try to apply to other sites.)

(SSL gets around this by having "trusted" third parties -- e.g. Verisign -- attest to the identity of one of the parties via its public key.)

(I'd appreciate any comments about how much of what I say here is correct. :-))
Droom
Profile Joined May 2009
23 Posts
August 10 2012 05:37 GMT
#237
Seeing this is my expertise, I can comment on this;

Bank vaults can be opened.
Safes can be cracked.
Door knobs can be picked.
Email passwords can be stolen

It's what you do with the info that matters!

I said that I received 3 emails that got through my filters, and that the FexEx asks for info (2009) ( my wife almost clicked).

I'm just trying to say that a lot of this stuff can be harmless but this 1 needs to be addressed


GoonFFS
Profile Joined April 2010
Denmark323 Posts
August 10 2012 05:38 GMT
#238
no probs
http://konvictgaming.com/ -> @KrugerFFS
Danglars
Profile Blog Joined August 2010
United States12133 Posts
August 10 2012 05:41 GMT
#239
I would never have expected Blizzard to be exploited in this way! Man, the site is such a rich hacking field, so many accounts reside on it. I'm like ... surely they've seen everything, are prepared against everything ... but wow, how meddlesome are the bugs that remain.

At least the passwords had cryptographic protection unlike controversies like Sony.
Great armies come from happy zealots, and happy zealots come from California!
TL+ Member
figq
Profile Blog Joined May 2010
12519 Posts
August 10 2012 05:56 GMT
#240
I just received recently a warning on my Battle.net email that someone unauthorized was trying to access it from North America. So these hackers are actively trying to break the emails, beware.

I was wondering how a hacker could even find this particular email, because I don't use it in any public forms, only for Battle.net.
If you stand next to my head, you can hear the ocean. - Day[9]
Prev 1 10 11 12 13 14 23 Next All
Please log in or register to reply.
Live Events Refresh
CranKy Ducklings
10:00
Sea Duckling Open #140
CranKy Ducklings78
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
Lowko280
RotterdaM 140
Railgan 28
StarCraft: Brood War
Sea 6731
Horang2 4316
GuemChi 1825
Jaedong 1024
Larva 892
actioN 301
Soma 298
Rush 295
Mini 253
Killer 226
[ Show more ]
BeSt 211
EffOrt 135
ToSsGirL 90
Hyun 83
Backho 57
Bonyth 42
sas.Sziky 36
Mind 35
PianO 33
JYJ28
Terrorterran 22
zelot 20
soO 9
HiyA 9
sorry 8
Sacsri 7
Dota 2
Gorgc6315
singsing2132
qojqva1478
Dendi433
XcaliburYe176
BananaSlamJamma51
Heroes of the Storm
Khaldor191
Other Games
B2W.Neo1102
Sick293
Fuzer 178
XaKoH 94
nookyyy 51
MindelVK17
Hui .0
Organizations
StarCraft 2
WardiTV645
Counter-Strike
PGL158
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 15 non-featured ]
StarCraft 2
• StrangeGG 64
• Dystopia_ 4
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• C_a_k_e 1496
League of Legends
• Stunt748
• HappyZerGling100
Upcoming Events
IPSL
4h 30m
dxtr13 vs OldBoy
Napoleon vs Doodle
LAN Event
4h 30m
Lambo vs Clem
Scarlett vs TriGGeR
ByuN vs TBD
Zoun vs TBD
BSL 21
6h 30m
Gosudark vs Kyrie
Gypsy vs OyAji
UltrA vs Radley
Dandy vs Ptak
Replay Cast
9h 30m
Sparkling Tuna Cup
20h 30m
WardiTV Korean Royale
22h 30m
LAN Event
1d 1h
IPSL
1d 4h
JDConan vs WIZARD
WolFix vs Cross
BSL 21
1d 6h
spx vs rasowy
HBO vs KameZerg
Cross vs Razz
dxtr13 vs ZZZero
Replay Cast
1d 19h
[ Show More ]
Wardi Open
1d 22h
WardiTV Korean Royale
2 days
Replay Cast
3 days
Kung Fu Cup
3 days
Classic vs Solar
herO vs Cure
Reynor vs GuMiho
ByuN vs ShoWTimE
Tenacious Turtle Tussle
4 days
The PondCast
4 days
RSL Revival
4 days
Solar vs Zoun
MaxPax vs Bunny
Kung Fu Cup
4 days
WardiTV Korean Royale
4 days
RSL Revival
5 days
Classic vs Creator
Cure vs TriGGeR
Kung Fu Cup
5 days
CranKy Ducklings
6 days
RSL Revival
6 days
herO vs Gerald
ByuN vs SHIN
Kung Fu Cup
6 days
Liquipedia Results

Completed

BSL 21 Points
SC4ALL: StarCraft II
Eternal Conflict S1

Ongoing

C-Race Season 1
IPSL Winter 2025-26
KCM Race Survival 2025 Season 4
SOOP Univ League 2025
YSL S2
BSL Season 21
Stellar Fest: Constellation Cup
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual

Upcoming

SLON Tour Season 2
BSL 21 Non-Korean Championship
Acropolis #4
IPSL Spring 2026
HSC XXVIII
RSL Offline Finals
WardiTV 2025
RSL Revival: Season 3
META Madness #9
BLAST Bounty Winter 2026: Closed Qualifier
eXTREMESLAND 2025
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.