• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EDT 16:05
CEST 22:05
KST 05:05
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
[ASL21] Ro24 Preview Pt2: News Flash9[ASL21] Ro24 Preview Pt1: New Chaos0Team Liquid Map Contest #22 - Presented by Monster Energy16ByuL: The Forgotten Master of ZvT30Behind the Blue - Team Liquid History Book20
Community News
Weekly Cups (March 23-29): herO takes triple6Aligulac acquired by REPLAYMAN.com/Stego Research8Weekly Cups (March 16-22): herO doubles, Cure surprises3Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool50Weekly Cups (March 9-15): herO, Clem, ByuN win4
StarCraft 2
General
Blizzard Classic Cup @ BlizzCon 2026 - $100k prize pool What mix of new & old maps do you want in the next ladder pool? (SC2) Team Liquid Map Contest #22 - Presented by Monster Energy Aligulac acquired by REPLAYMAN.com/Stego Research Weekly Cups (March 23-29): herO takes triple
Tourneys
RSL Season 4 announced for March-April Sparkling Tuna Cup - Weekly Open Tournament StarCraft Evolution League (SC Evo Biweekly) WardiTV Mondays World University TeamLeague (500$+) | Signups Open
Strategy
Custom Maps
[M] (2) Frigid Storage Publishing has been re-enabled! [Feb 24th 2026]
External Content
Mutation # 519 Inner Power The PondCast: SC2 News & Results Mutation # 518 Radiation Zone Mutation # 517 Distant Threat
Brood War
General
Pros React To: JaeDong vs Queen Gypsy to Korea How Can I Add Timer & APM Count? [ASL21] Ro24 Preview Pt2: News Flash ASL21 General Discussion
Tourneys
[ASL21] Ro24 Group E [Megathread] Daily Proleagues [ASL21] Ro24 Group F Azhi's Colosseum - Foreign KCM
Strategy
Fighting Spirit mining rates What's the deal with APM & what's its true value Simple Questions, Simple Answers
Other Games
General Games
Nintendo Switch Thread Stormgate/Frost Giant Megathread Starcraft Tabletop Miniature Game General RTS Discussion Thread Darkest Dungeon
Dota 2
The Story of Wings Gaming Official 'what is Dota anymore' discussion
League of Legends
G2 just beat GenG in First stand
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas TL Mafia Community Thread Five o'clock TL Mafia
Community
General
US Politics Mega-thread Russo-Ukrainian War Thread NASA and the Private Sector Things Aren’t Peaceful in Palestine Canadian Politics Mega-thread
Fan Clubs
The IdrA Fan Club
Media & Entertainment
[Req][Books] Good Fantasy/SciFi books [Manga] One Piece Movie Discussion!
Sports
2024 - 2026 Football Thread Formula 1 Discussion Cricket [SPORT] Tokyo Olympics 2021 Thread General nutrition recommendations
World Cup 2022
Tech Support
[G] How to Block Livestream Ads
TL Community
The Automated Ban List
Blogs
Funny Nicknames
LUCKY_NOOB
Money Laundering In Video Ga…
TrAiDoS
Iranian anarchists: organize…
XenOsky
FS++
Kraekkling
Shocked by a laser…
Spydermine0240
ASL S21 English Commentary…
namkraft
Customize Sidebar...

Website Feedback

Closed Threads



Active: 1642 users

Blizzard Security Breach - Page 9

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 7 8 9 10 11 23 Next All
Bippzy
Profile Blog Joined March 2011
United States1466 Posts
Last Edited: 2012-08-10 00:59:41
August 10 2012 00:57 GMT
#161
All I can think of really(*after changing my password) is that I forgot my current security question, so my Bnet account has been stuck on an email I don't want it to be. Hopefully, I will be able to change the email with this serendipitous change!

Also sux that blizz was accessed. Can't put too much blame, not all companies can be permanently on the ball.

On August 10 2012 09:33 Serpico wrote:
Show nested quote +
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.

Well touche to this guy. I went on, but IDK what I'd want to change.
LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK LEENOCK
crawlingchaos
Profile Joined March 2011
Canada2025 Posts
August 10 2012 01:04 GMT
#162
Damn, I like keeping all my passwords relatively similar. Oh well.

This just reminds me that I ALWAYS forget the answers my the security questions -_-
They say that life's a carousel, spinning fast you've gotta ride it well, the world is full of kings and queens who blind your eyes and steal your dreams, it's heaven and hell, oh well.
JJH777
Profile Joined January 2011
United States4415 Posts
August 10 2012 01:08 GMT
#163
Lol I'm glad this happened after all the blind fanboys were saying THERE WAS ABSOLUTELY NO WAY the huge amount of D3 accounts getting hacked was a problem on blizzard's end.
AnachronisticAnarchy
Profile Blog Joined July 2011
United States2957 Posts
August 10 2012 01:12 GMT
#164
On August 10 2012 09:33 Serpico wrote:
Show nested quote +
On August 10 2012 09:31 xrapture wrote:
My email:

Decado@writing.com


Password:

teehee12



Do whatever the fuck you want.

So many pussies crying over nothing.

This guy is super tough. What a tough guy.


Also stupid, unless he doesn't want to play SC2 anymore. He probably forgot that we can do more than just bomb his MMR, such as changing his password and information.
"How are you?" "I am fine, because it is not normal to scream in pain."
Integra
Profile Blog Joined January 2008
Sweden5626 Posts
August 10 2012 01:16 GMT
#165
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.
"Dark Pleasure" | | I survived the Locust war of May 3, 2014
FryktSkyene
Profile Joined December 2010
United States1327 Posts
Last Edited: 2012-08-10 01:22:22
August 10 2012 01:21 GMT
#166
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


wow
Snitches get stiches
Psychonian
Profile Joined March 2012
United States2322 Posts
August 10 2012 01:27 GMT
#167
ffs

God damn it blizzard there is no end of problems with your sites.
Trans Rights
Wuster
Profile Joined May 2011
1974 Posts
August 10 2012 01:30 GMT
#168
On August 10 2012 09:55 delHospital wrote:
Show nested quote +
On August 10 2012 07:34 juicyjames wrote:
When did Blizzard learn of the unauthorized access?
The trespass into our internal network was detected by us on August 4, 2012.

Why did Blizzard announce this on August 9?
We were debating whether to sweep it under the rug or not.

But seriously, what is the reason for taking such a long time?


1 business week isn't all that long. What they said is pretty reasonable at face value.

After all, the PSN mess was exacerbated by them claiming that no personal data was lost, then no financial data was lost, then 'actually they got everything'. That's not just bad PR, it also prevents customers from actually doing anything about the security breach in a timely manner (unless they just didn't trust PSN's everything's fine message, which why not, doesn't hurt to be extra safe).

If Blizzard knew that sensitive data was compromised, then that's something you can just say. But if you're affirming that no sensitive data was compromised, you'd better be damned sure before you say anything.

Plus, it's entirely possible that they were busy closing security breaches and just didn't get around to checking what was stolen until after the fact, after all you have to stop the problem rather than make press releases. Not to mention it would probably take a company as large as blizzard a non-trivial amount of time to verify what was and was not accessed by the hackers.
Alakaslam
Profile Blog Joined September 2011
United States17336 Posts
Last Edited: 2012-08-10 01:39:53
August 10 2012 01:30 GMT
#169
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

Thanks! 63 million years. I'm good XD
Edit: bank acc is good against 38 septillion years worth of a desktop. Good to know. Thing is, how much time would 5 servers crunching in tandem save?
If you think Elon Musk is a Nazi, it is because YOU radicalized him!
MVega
Profile Joined November 2010
763 Posts
August 10 2012 01:32 GMT
#170
On August 10 2012 10:27 Psychonian wrote:
ffs

God damn it blizzard there is no end of problems with your sites.


I think in the last 10~ years of playing Blizzard games the only issues I had with their out of game stuff was this, which I understand happening as it's happened to several larger corporations in the last couple years, and battle.net emails would get lost routinely several years back. Their website is down for maintenance a lot, but that's not usually problematic. Sometimes they have what feels like excessive downtime on the games. What problems with their sites are you running into? O.o
bumkin: How can you play like 50 games per day... I 4gate 2 times then it's nap time
Bayyne
Profile Joined January 2011
United States1967 Posts
August 10 2012 01:34 GMT
#171
OT but shit that website boosted my password strength morale big time. 147 quadrillion years!

I did also change my password as soon as I heard about this incident as there really is no pressing reason not to.
Remember not only to say the right thing in the right place, but far more difficult still, to leave unsaid the wrong thing at the tempting moment.
oxxo
Profile Joined February 2010
988 Posts
August 10 2012 01:34 GMT
#172
On August 10 2012 10:08 JJH777 wrote:
Lol I'm glad this happened after all the blind fanboys were saying THERE WAS ABSOLUTELY NO WAY the huge amount of D3 accounts getting hacked was a problem on blizzard's end.


Did you even read the announcement? This has nothing to do with the D3 accounts. They got encrypted passwords. Not only that, there's no way for the hackers to know who had D3 or not. They couldn't pick and choose D3 accounts with this stolen information.

Only D3 accounts start getting stolen right after release? Far more likely that people are clicking stuff they shouldn't be.
ggrrg
Profile Blog Joined September 2009
Bulgaria2716 Posts
August 10 2012 01:34 GMT
#173
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.
Alakaslam
Profile Blog Joined September 2011
United States17336 Posts
Last Edited: 2012-08-10 01:48:19
August 10 2012 01:45 GMT
#174
On August 10 2012 10:34 ggrrg wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Pick a random year. There's four numbers. Then sum up what that year is to you in a few words. Example: 1972lotof$$GAS would take 2 billion.

Granted mine is 25+ characters but that's my bank acc! Sc2 is still over 16 though.
If you think Elon Musk is a Nazi, it is because YOU radicalized him!
ulan-bat
Profile Blog Joined August 2011
China403 Posts
Last Edited: 2012-08-10 01:48:59
August 10 2012 01:48 GMT
#175
On August 10 2012 10:34 ggrrg wrote:
Show nested quote +
On August 10 2012 10:16 Integra wrote:
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.


I feel like you're somewhat overdoing it ^^ Do you really feel like typing 29 characters just to enter bnet?
According to that website my bnet password is crackable in 19 seconds... I use this password for most stuff I don't care about. But my "secure" password feels somewhat weak, too. 345k years for a regular desktop... I guess it's time to add a number and a special character.

Please just don't use the same password on every site, that's it. Even if your password takes trillions years to decipher, things like key-loggers or someone behind you at a cafe or any over mean of getting your ULTIMATE PASSWORD would just wreck your world.
At least use "base password+last letters of the site's url", or something.
"Short games, shorts, summer weather, those things bring the heat!" - EG.iNcontroL
robjapan
Profile Joined April 2011
Japan104 Posts
August 10 2012 01:50 GMT
#176
I'd love to change my password.... only one problem!!

The whole of Japan can not access battle.net
Cheese is only cheese when you lose, when you win it's a valid tactic
Ganondorf
Profile Joined April 2010
Italy600 Posts
August 10 2012 01:53 GMT
#177
Was about to type my password on that site that measures how safe it is, but if i type on such a random site, doesn't it make much less safe ? :D

Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.

I'm in Europe so according to Blizzard nothing from there was compromised except emails (still bad if i'll get phishing emails now).
entropius
Profile Joined June 2010
United States1046 Posts
August 10 2012 01:57 GMT
#178
On August 10 2012 10:53 Ganondorf wrote:
Was about to type my password on that site that measures how safe it is, but if i type on such a random site, doesn't it make much less safe ? :D

Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.

I'm in Europe so according to Blizzard nothing from there was compromised except emails (still bad if i'll get phishing emails now).


That site just downloads a Javascript code on your computer that does the math on your end; your password's never transmitted across the network.
Sir.Kimmel
Profile Blog Joined May 2006
United States785 Posts
August 10 2012 01:58 GMT
#179
On August 10 2012 10:16 Integra wrote:
Show nested quote +
On August 10 2012 09:11 Corrosive wrote:
Stuff like this happens often to companies like this. As long as blizzard didn't store everything in plaintext like Sony did, everything should be fine.

If you want to see how long it would take your password to be cracked check this out
http://howsecureismypassword.net/

according to this website it will take them 40 undecillion years or in numbers:40,464,702,078,891,060,000,000,000,000,000,000,000 years to crack my password... goodluck with that.



This takes into account a basic desktop server..... which can do roughly I think 25k passwords a second with standard bruteforcing it really depends... while our system at work using 4 gpus (mmm cuda) can do 1.7 billion a second... there are custom password cracking machines such as Reliks which does 25 billion a second http://www.hackingtheuniverse.com/infosec/tools/gpu-password-cracking


Now... yes brute forcing takes forever, and its not the most effective, the most effective way is to use rainbow tables... so a standard 8-14 character password can be cracked relatively quickly usually between 5-10 minutes...

so while these websites are nice and give decent ideas.. the numbers are completely wrong...

but remember .. when creating passwords.. complexity is important but the most important aspect of creating a password is length...


the difference between 14 characters and 18 characters is exponential... (30 minutes to 3 months)...

I always recommend using a passphrase... something simple like H! my name is Johny Mc Johnson and I am 24 years old


simple to remember... hardddddd to crack unless u have a specifically tuned list

Lets throw in Canada into the mix and we can rename our country to Camerico. --Klogon
sapht
Profile Blog Joined August 2010
Sweden141 Posts
August 10 2012 01:59 GMT
#180
On August 10 2012 10:53 Ganondorf wrote:
Unless there's a hack to send password hashes directly, they will crack the simplest and most common passwords. Instead of decrypting the hashes, they will encrypt a vocabulary of most commonly used passwords and find the ones with the same hash. So, if you're password wasn't secure, there's a good chance it's compromised.


Not if there's a salt, which there should be, considering that they actually thought about password security and didn't store them in plaintext. Assuming the salt wasn't compromised.

I kinda expected this to happen so I used a unique password for bnet. 1 point for me.
You can use control groups to train units without even looking at your base.
Prev 1 7 8 9 10 11 23 Next All
Please log in or register to reply.
Live Events Refresh
BSL
19:00
S22 - Open Qualifier #5
ZZZero.O78
LiquipediaDiscussion
Ladder Legends
18:00
Amateur Showdown #3
Liquipedia
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
elazer 222
JuggernautJason112
SpeCial 101
EmSc Tv 24
PattyMac 9
StarCraft: Brood War
Britney 21964
Mini 235
Soulkey 169
firebathero 115
Dewaltoss 107
ZZZero.O 78
sorry 78
yabsab 22
Dota 2
420jenkins516
LuMiX1
League of Legends
Reynor51
JimRising 20
Counter-Strike
byalli754
Heroes of the Storm
Khaldor361
Other Games
summit1g5214
Grubby2355
FrodaN1669
Hui .138
Trikslyr47
Organizations
Other Games
gamesdonequick1358
StarCraft 2
angryscii 28
EmSc Tv 24
EmSc2Tv 24
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 22 non-featured ]
StarCraft 2
• printf 55
• Hupsaiya 16
• Freeedom8
• davetesta8
• LaughNgamezSOOP
• sooper7s
• AfreecaTV YouTube
• intothetv
• Migwel
• Kozan
• IndyKCrew
StarCraft: Brood War
• blackmanpl 26
• RayReign 24
• Azhi_Dahaki6
• STPLYoutube
• ZZZeroYoutube
• BSLYoutube
Dota 2
• C_a_k_e 3353
• lizZardDota284
Other Games
• imaqtpie916
• WagamamaTV395
• Shiphtur175
Upcoming Events
RSL Revival
10h 55m
Cure vs Rogue
Maru vs TBD
MaxPax vs TBD
uThermal 2v2 Circuit
17h 55m
BSL
22h 55m
Afreeca Starleague
1d 13h
Wardi Open
1d 13h
Replay Cast
2 days
Sparkling Tuna Cup
2 days
Kung Fu Cup
3 days
The PondCast
4 days
Replay Cast
5 days
[ Show More ]
Replay Cast
6 days
CranKy Ducklings
6 days
BSL
6 days
Liquipedia Results

Completed

Escore Tournament S2: W1
WardiTV Winter 2026
NationLESS Cup

Ongoing

BSL Season 22
CSL Elite League 2026
ASL Season 21
CSL Season 20: Qualifier 2
StarCraft2 Community Team League 2026 Spring
RSL Revival: Season 4
Nations Cup 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League S23 Finals
ESL Pro League S23 Stage 1&2
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026

Upcoming

CSL 2026 SPRING (S20)
IPSL Spring 2026
Acropolis #4
BSL 22 Non-Korean Championship
CSLAN 4
Kung Fu Cup 2026 Grand Finals
HSC XXIX
uThermal 2v2 2026 Main Event
IEM Cologne Major 2026
Stake Ranked Episode 2
CS Asia Championships 2026
Asian Champions League 2026
IEM Atlanta 2026
PGL Astana 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
IEM Rio 2026
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.