• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 16:19
CEST 22:19
KST 05:19
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt2: News Flash10[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy18ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20
Community News
Weekly Cups (March 23-29): herO takes triple6Aligulac acquired by REPLAYMAN.com/Stego Research8Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool51Weekly Cups (March 9-15): herO, Clem, ByuN win4
StarCraft 2
General
Team Liquid Map Contest #22 - Presented by Monster Energy Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool What mix of new & old maps do you want in the next ladder pool? (SC2) Aligulac acquired by REPLAYMAN.com/Stego Research Weekly Cups (March 23-29): herO takes triple
Tourneys
RSL Season 4 announced for March-April Sparkling Tuna Cup - Weekly Open Tournament StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays World University TeamLeague (500$+) | Signups Open
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
The PondCast: SC2 News & Results Mutation # 520 Moving Fees Mutation # 519 Inner Power Mutation # 518 Radiation Zone
Brood War
General
so ive been playing broodwar for a week straight. Klaucher discontinued / in-game color settings BGH Auto Balance -> http://bghmmr.eu/ Pros React To: JaeDong vs Queen [ASL21] Ro24 Preview Pt2: News Flash
Tourneys
[Megathread] Daily Proleagues [ASL21] Ro24 Group E [ASL21] Ro24 Group F Azhi's Colosseum - Foreign KCM
Strategy
What's the deal with APM & what's its true value Fighting Spirit mining rates Simple Questions, Simple Answers
Other Games
General Games
Starcraft Tabletop Miniature Game Nintendo Switch Thread Stormgate/Frost Giant Megathread General RTS Discussion Thread Darkest Dungeon
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
The Chess Thread US Politics Mega-thread Russo-Ukrainian War Thread NASA and the Private Sector Things Aren’t Peaceful in Palestine
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Req][Books] Good Fantasy/SciFi books [Manga] One Piece Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion Cricket [SPORT] Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
China Uses Video Games to Sh…
TrAiDoS
Funny Nicknames
LUCKY_NOOB
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
ASL S21 English Commentary…
namkraft
Electronics
mantequilla
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1625 users

Blizzard Security Breach - Page 17

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 15 16 17 18 19 23 Next All
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:19:59
August 10 2012 11:19 GMT
#321
On August 10 2012 20:10 Ganondorf wrote:
Show nested quote +
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:23:50
August 10 2012 11:21 GMT
#322
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bane of every network administrator everywhere.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:26:39
August 10 2012 11:26 GMT
#323
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 11:28 GMT
#324
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


please don't waste the effort put into this post.

On August 10 2012 20:07 Morfildur wrote:
Show nested quote +
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.

Team Liquid is the used the tampon of the starcraft community.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2012-08-10 11:34:06
August 10 2012 11:33 GMT
#325
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...
LiquipediaWanderer
HaruRH
Profile Blog Joined August 2011
Singapore2780 Posts
August 10 2012 11:40 GMT
#326
Ugh. I was hit by this. My account had been locked and all my game accounts were locked as well. I needed to unlock ALL my game accounts, one by one. I had to bind my account with an authenticator because those blizzard folks won't let me unlock my accounts without one. There you go.
It is fucking D4 and you are still alive as a CONFIRMED FUCKING TOWN. This is how fucking terrible scum thinks you are - Koshi
Broodwurst
Profile Joined June 2011
Germany1586 Posts
August 10 2012 11:46 GMT
#327
On August 10 2012 20:19 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293


Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 12:05:23
August 10 2012 11:50 GMT
#328
On August 10 2012 20:33 Ragnarork wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as a 10.767 password disallowing upper case characters, which means an 11 letter password not allowing upper case characters is better.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:55:03
August 10 2012 11:54 GMT
#329
On August 10 2012 20:50 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:33 Ragnarork wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as an 10.767 password disallowing upper case characters, which means an 11 letter password without upper case is better.

thus not making you an idiot. the math checks out.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:56 GMT
#330
On August 10 2012 20:46 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.
Arcanefrost
Profile Blog Joined August 2010
Belgium1257 Posts
August 10 2012 11:57 GMT
#331
what if the hackers need the password resets for their true masterplan, and this is exactly what they want
Valor is a poor substitute for numbers.
Broodwurst
Profile Joined June 2011
Germany1586 Posts
Last Edited: 2012-08-10 12:08:42
August 10 2012 12:08 GMT
#332
On August 10 2012 20:56 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:
Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
Blacktion
Profile Joined November 2010
United Kingdom1148 Posts
August 10 2012 12:15 GMT
#333
Meh, even if they got everything from the Europe users it wouldnt effect me much, my account has no payment info linked to it because i bought a physical copy of SC2, the only blizzard game i own.
Also pretty sure i registered it with an email account i almost never use.
Where's Boxer, there's victory! - figq
Kreb
Profile Joined September 2010
4834 Posts
Last Edited: 2012-08-10 12:28:10
August 10 2012 12:27 GMT
#334
On August 10 2012 21:08 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:56 paralleluniverse wrote:
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:

Flawless or not (define 'flawless' in the context first...), your attempts at taking cheap points by posting links about any possible Blizzards mistakes are quite petty. The last one isnt even about Blizzard but about Blizzards employees. Do yourself a favor and stop.

Of course Blizz arent perfect, no one is. But flawless or not, Blizz has very good security in place.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:37
August 10 2012 12:31 GMT
#335
edit: sry, was writing in wrong thread and thus even double posted >.<
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:50
August 10 2012 12:33 GMT
#336
edit:
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 12:35 GMT
#337
On August 10 2012 19:28 Fuchsteufelswild wrote:
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.

The people who need to be most concerned are those who use 1 password for everything. At this point, you should consider your username/email and password in the property of criminals, which means you now should change that password everywhere you've used it where you don't want to lose personal data.

I don't care too much, for example, if someone hacks my team liquid account, but if I believed someone had the capability of accessing my banking data I would be remiss to not change that password.
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 12:39 GMT
#338
On August 10 2012 21:31 Na_Dann_Ma_GoGo wrote:
Hmm he adds more Queens instead of using spores, interesting.

yet, slightly irrelevant to the topic
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
CamoPillbox
Profile Joined April 2012
Czech Republic229 Posts
August 10 2012 12:48 GMT
#339
with patch 1.5 no one cares stolen data cause no one play after this highly game ruiner patch sc2.....case locked.....
Czech Terran(Hots) player
Ryder.
Profile Joined January 2011
1117 Posts
August 10 2012 13:27 GMT
#340
Are we supposed to change our secret question/answer? It is not immediately obvious to me on how to do it myself, does Blizzard expect we contact them and do it or will that not be necessary?
Prev 1 15 16 17 18 19 23 Next All
Please log in or register to reply.
Live Events Refresh
BSL
19:00
S22 - Open Qualifier #6
ZZZero.O106
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
mouzHeroMarine 568
elazer 330
IndyStarCraft 228
Hui .107
StarCraft: Brood War
Britney 15582
Mini 597
Larva 350
Dewaltoss 125
ZZZero.O 106
IntoTheRainbow 19
HiyA 10
Dota 2
capcasts106
canceldota101
League of Legends
JimRising 134
Counter-Strike
olofmeister17736
tarik_tv2693
byalli1733
Heroes of the Storm
Liquid`Hasu384
Khaldor243
Other Games
summit1g9428
Grubby3444
FrodaN2170
fl0m967
B2W.Neo887
mouzStarbuck287
ArmadaUGS115
Trikslyr48
Railgan7
Organizations
Other Games
gamesdonequick1504
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 15 non-featured ]
StarCraft 2
• Response 2
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• RayReign 29
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
League of Legends
• Doublelift1971
Other Games
• Shiphtur230
• tFFMrPink 16
Upcoming Events
Afreeca Starleague
13h 41m
Wardi Open
13h 41m
Replay Cast
1d 3h
Sparkling Tuna Cup
1d 13h
Kung Fu Cup
2 days
The PondCast
3 days
Replay Cast
4 days
Replay Cast
5 days
CranKy Ducklings
5 days
BSL
5 days
[ Show More ]
Replay Cast
6 days
Sparkling Tuna Cup
6 days
BSL
6 days
Liquipedia Results

Completed

Escore Tournament S2: W1
WardiTV Winter 2026
NationLESS Cup

Ongoing

BSL Season 22
CSL Elite League 2026
ASL Season 21
CSL Season 20: Qualifier 2
StarCraft2 Community Team League 2026 Spring
Nations Cup 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026

Upcoming

CSL 2026 SPRING (S20)
Escore Tournament S2: W2
IPSL Spring 2026
Escore Tournament S2: W3
Acropolis #4
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
RSL Revival: Season 5
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
Asian Champions League 2026
IEM Atlanta 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.