• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 19:17
CEST 01:17
KST 08:17
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Team TLMC #5 - Finalists & Open Tournaments0[ASL20] Ro16 Preview Pt2: Turbulence10Classic Games #3: Rogue vs Serral at BlizzCon9[ASL20] Ro16 Preview Pt1: Ascent10Maestros of the Game: Week 1/Play-in Preview12
Community News
StarCraft II 5.0.15 PTR Patch Notes45BSL 2025 Warsaw LAN + Legends Showmatch0Weekly Cups (Sept 8-14): herO & MaxPax split cups4WardiTV TL Team Map Contest #5 Tournaments1SC4ALL $6,000 Open LAN in Philadelphia8
StarCraft 2
General
StarCraft II 5.0.15 PTR Patch Notes #1: Maru - Greatest Players of All Time Weekly Cups (Sept 8-14): herO & MaxPax split cups Team Liquid Map Contest #21 - Presented by Monster Energy SpeCial on The Tasteless Podcast
Tourneys
SC2's Safe House 2 - October 18 & 19 RSL: Revival, a new crowdfunded tournament series Maestros of The Game—$20k event w/ live finals in Paris Sparkling Tuna Cup - Weekly Open Tournament SC4ALL $6,000 Open LAN in Philadelphia
Strategy
Custom Maps
External Content
Mutation # 491 Night Drive Mutation # 490 Masters of Midnight Mutation # 489 Bannable Offense Mutation # 488 What Goes Around
Brood War
General
ASL20 General Discussion Soulkey on ASL S20 BW General Discussion ASL TICKET LIVE help! :D NaDa's Body
Tourneys
[ASL20] Ro16 Group C [ASL20] Ro16 Group D Small VOD Thread 2.0 [Megathread] Daily Proleagues
Strategy
Simple Questions, Simple Answers Muta micro map competition Fighting Spirit mining rates [G] Mineral Boosting
Other Games
General Games
Stormgate/Frost Giant Megathread Borderlands 3 Path of Exile Nintendo Switch Thread General RTS Discussion Thread
Dota 2
Official 'what is Dota anymore' discussion LiquidDota to reintegrate into TL.net
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Heroes of StarCraft mini-set
TL Mafia
TL Mafia Community Thread
Community
General
Things Aren’t Peaceful in Palestine US Politics Mega-thread Russo-Ukrainian War Thread UK Politics Mega-thread Canadian Politics Mega-thread
Fan Clubs
The Happy Fan Club!
Media & Entertainment
Movie Discussion! [Manga] One Piece Anime Discussion Thread
Sports
2024 - 2026 Football Thread Formula 1 Discussion MLB/Baseball 2023
World Cup 2022
Tech Support
Linksys AE2500 USB WIFI keeps disconnecting Computer Build, Upgrade & Buying Resource Thread High temperatures on bridge(s)
TL Community
BarCraft in Tokyo Japan for ASL Season5 Final The Automated Ban List
Blogs
i'm really bored guys
Peanutsc
I <=> 9
KrillinFromwales
The Personality of a Spender…
TrAiDoS
A very expensive lesson on ma…
Garnet
hello world
radishsoup
Lemme tell you a thing o…
JoinTheRain
RTS Design in Hypercoven
a11
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2037 users

Blizzard Security Breach - Page 17

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 15 16 17 18 19 23 Next All
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:19:59
August 10 2012 11:19 GMT
#321
On August 10 2012 20:10 Ganondorf wrote:
Show nested quote +
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:23:50
August 10 2012 11:21 GMT
#322
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bane of every network administrator everywhere.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:26:39
August 10 2012 11:26 GMT
#323
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 11:28 GMT
#324
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


please don't waste the effort put into this post.

On August 10 2012 20:07 Morfildur wrote:
Show nested quote +
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.

Team Liquid is the used the tampon of the starcraft community.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2012-08-10 11:34:06
August 10 2012 11:33 GMT
#325
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...
LiquipediaWanderer
HaruRH
Profile Blog Joined August 2011
Singapore2780 Posts
August 10 2012 11:40 GMT
#326
Ugh. I was hit by this. My account had been locked and all my game accounts were locked as well. I needed to unlock ALL my game accounts, one by one. I had to bind my account with an authenticator because those blizzard folks won't let me unlock my accounts without one. There you go.
It is fucking D4 and you are still alive as a CONFIRMED FUCKING TOWN. This is how fucking terrible scum thinks you are - Koshi
Broodwurst
Profile Joined June 2011
Germany1586 Posts
August 10 2012 11:46 GMT
#327
On August 10 2012 20:19 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293


Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 12:05:23
August 10 2012 11:50 GMT
#328
On August 10 2012 20:33 Ragnarork wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as a 10.767 password disallowing upper case characters, which means an 11 letter password not allowing upper case characters is better.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:55:03
August 10 2012 11:54 GMT
#329
On August 10 2012 20:50 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:33 Ragnarork wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as an 10.767 password disallowing upper case characters, which means an 11 letter password without upper case is better.

thus not making you an idiot. the math checks out.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:56 GMT
#330
On August 10 2012 20:46 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.
Arcanefrost
Profile Blog Joined August 2010
Belgium1257 Posts
August 10 2012 11:57 GMT
#331
what if the hackers need the password resets for their true masterplan, and this is exactly what they want
Valor is a poor substitute for numbers.
Broodwurst
Profile Joined June 2011
Germany1586 Posts
Last Edited: 2012-08-10 12:08:42
August 10 2012 12:08 GMT
#332
On August 10 2012 20:56 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:
Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
Blacktion
Profile Joined November 2010
United Kingdom1148 Posts
August 10 2012 12:15 GMT
#333
Meh, even if they got everything from the Europe users it wouldnt effect me much, my account has no payment info linked to it because i bought a physical copy of SC2, the only blizzard game i own.
Also pretty sure i registered it with an email account i almost never use.
Where's Boxer, there's victory! - figq
Kreb
Profile Joined September 2010
4834 Posts
Last Edited: 2012-08-10 12:28:10
August 10 2012 12:27 GMT
#334
On August 10 2012 21:08 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:56 paralleluniverse wrote:
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:

Flawless or not (define 'flawless' in the context first...), your attempts at taking cheap points by posting links about any possible Blizzards mistakes are quite petty. The last one isnt even about Blizzard but about Blizzards employees. Do yourself a favor and stop.

Of course Blizz arent perfect, no one is. But flawless or not, Blizz has very good security in place.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:37
August 10 2012 12:31 GMT
#335
edit: sry, was writing in wrong thread and thus even double posted >.<
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:50
August 10 2012 12:33 GMT
#336
edit:
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 12:35 GMT
#337
On August 10 2012 19:28 Fuchsteufelswild wrote:
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.

The people who need to be most concerned are those who use 1 password for everything. At this point, you should consider your username/email and password in the property of criminals, which means you now should change that password everywhere you've used it where you don't want to lose personal data.

I don't care too much, for example, if someone hacks my team liquid account, but if I believed someone had the capability of accessing my banking data I would be remiss to not change that password.
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 12:39 GMT
#338
On August 10 2012 21:31 Na_Dann_Ma_GoGo wrote:
Hmm he adds more Queens instead of using spores, interesting.

yet, slightly irrelevant to the topic
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
CamoPillbox
Profile Joined April 2012
Czech Republic229 Posts
August 10 2012 12:48 GMT
#339
with patch 1.5 no one cares stolen data cause no one play after this highly game ruiner patch sc2.....case locked.....
Czech Terran(Hots) player
Ryder.
Profile Joined January 2011
1117 Posts
August 10 2012 13:27 GMT
#340
Are we supposed to change our secret question/answer? It is not immediately obvious to me on how to do it myself, does Blizzard expect we contact them and do it or will that not be necessary?
Prev 1 15 16 17 18 19 23 Next All
Please log in or register to reply.
Live Events Refresh
Next event in 10h 43m
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
NeuroSwarm 256
SteadfastSC 166
CosmosSc2 42
ROOTCatZ 23
StarCraft: Brood War
Britney 12898
Artosis 705
Shuttle 373
Aegong 48
Sexy 40
ZZZero.O 15
Dota 2
monkeys_forever666
League of Legends
JimRising 2023
Counter-Strike
Stewie2K390
Super Smash Bros
Mew2King53
Other Games
summit1g7227
FrodaN1313
shahzam785
C9.Mang0132
Trikslyr46
ViBE24
Organizations
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 17 non-featured ]
StarCraft 2
• RyuSc2 45
• davetesta30
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• intothetv
• Migwel
• Kozan
• IndyKCrew
StarCraft: Brood War
• HerbMon 3
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
League of Legends
• Doublelift5244
• imaqtpie1656
• Shiphtur326
Other Games
• Scarra1500
Upcoming Events
RSL Revival
10h 43m
Zoun vs Classic
Map Test Tournament
11h 43m
Korean StarCraft League
1d 3h
BSL Open LAN 2025 - War…
1d 8h
RSL Revival
1d 10h
Reynor vs Cure
BSL Open LAN 2025 - War…
2 days
RSL Revival
2 days
Online Event
2 days
Wardi Open
3 days
Monday Night Weeklies
3 days
[ Show More ]
Sparkling Tuna Cup
4 days
LiuLi Cup
5 days
The PondCast
6 days
Liquipedia Results

Completed

Proleague 2025-09-10
Chzzk MurlocKing SC1 vs SC2 Cup #2
HCC Europe

Ongoing

BSL 20 Team Wars
KCM Race Survival 2025 Season 3
BSL 21 Points
ASL Season 20
CSL 2025 AUTUMN (S18)
LASL Season 20
RSL Revival: Season 2
Maestros of the Game
StarSeries Fall 2025
FISSURE Playground #2
BLAST Open Fall 2025
BLAST Open Fall Qual
Esports World Cup 2025
BLAST Bounty Fall 2025
BLAST Bounty Fall Qual
IEM Cologne 2025
FISSURE Playground #1

Upcoming

2025 Chongqing Offline CUP
BSL World Championship of Poland 2025
IPSL Winter 2025-26
BSL Season 21
SC4ALL: Brood War
BSL 21 Team A
Stellar Fest
SC4ALL: StarCraft II
EC S1
ESL Impact League Season 8
SL Budapest Major 2025
BLAST Rivals Fall 2025
IEM Chengdu 2025
PGL Masters Bucharest 2025
Thunderpick World Champ.
CS Asia Championships 2025
ESL Pro League S22
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2025 TLnet. All Rights Reserved.