• Log InLog In
  • Register
Liquid`
Team Liquid Liquipedia
EST 20:13
CET 02:13
KST 10:13
  • Home
  • Forum
  • Calendar
  • Streams
  • Liquipedia
  • Features
  • Store
  • EPT
  • TL+
  • StarCraft 2
  • Brood War
  • Smash
  • Heroes
  • Counter-Strike
  • Overwatch
  • Liquibet
  • Fantasy StarCraft
  • TLPD
  • StarCraft 2
  • Brood War
  • Blogs
Forum Sidebar
Events/Features
News
Featured News
Behind the Blue - Team Liquid History Book15Clem wins HomeStory Cup 289HomeStory Cup 28 - Info & Preview13Rongyi Cup S3 - Preview & Info8herO wins SC2 All-Star Invitational14
Community News
ACS replaced by "ASL Season Open" - Starts 21/0218LiuLi Cup: 2025 Grand Finals (Feb 10-16)22Weekly Cups (Feb 2-8): Classic, Solar, MaxPax win2Nexon's StarCraft game could be FPS, led by UMS maker10PIG STY FESTIVAL 7.0! (19 Feb - 1 Mar)13
StarCraft 2
General
Nexon's StarCraft game could be FPS, led by UMS maker How do you think the 5.0.15 balance patch (Oct 2025) for StarCraft II has affected the game? Terran Scanner Sweep Behind the Blue - Team Liquid History Book Weekly Cups (Jan 12-18): herO, MaxPax, Solar win
Tourneys
LiuLi Cup: 2025 Grand Finals (Feb 10-16) PIG STY FESTIVAL 7.0! (19 Feb - 1 Mar) RSL Revival: Season 4 Korea Qualifier (Feb 14) Sparkling Tuna Cup - Weekly Open Tournament RSL Season 4 announced for March-April
Strategy
Custom Maps
Map Editor closed ? [A] Starcraft Sound Mod
External Content
The PondCast: SC2 News & Results Mutation # 512 Overclocked Mutation # 511 Temple of Rebirth Mutation # 510 Safety Violation
Brood War
General
[ASL21] Potential Map Candidates Gypsy to Korea Which units you wish saw more use in the game? ACS replaced by "ASL Season Open" - Starts 21/02 Liquipedia.net NEEDS editors for Brood War
Tourneys
Escore Tournament StarCraft Season 1 [Megathread] Daily Proleagues Small VOD Thread 2.0 KCM Race Survival 2026 Season 1
Strategy
Fighting Spirit mining rates Zealot bombing is no longer popular? Simple Questions, Simple Answers Current Meta
Other Games
General Games
Path of Exile Diablo 2 thread Nintendo Switch Thread Battle Aces/David Kim RTS Megathread ZeroSpace Megathread
Dota 2
Official 'what is Dota anymore' discussion
League of Legends
Heroes of the Storm
Simple Questions, Simple Answers Heroes of the Storm 2.0
Hearthstone
Deck construction bug Heroes of StarCraft mini-set
TL Mafia
Mafia Game Mode Feedback/Ideas Vanilla Mini Mafia TL Mafia Community Thread
Community
General
US Politics Mega-thread Ask and answer stupid questions here! European Politico-economics QA Mega-thread The Games Industry And ATVI Russo-Ukrainian War Thread
Fan Clubs
The IdrA Fan Club The herO Fan Club!
Media & Entertainment
[Manga] One Piece Anime Discussion Thread
Sports
2024 - 2026 Football Thread
World Cup 2022
Tech Support
TL Community
The Automated Ban List
Blogs
ADHD And Gaming Addiction…
TrAiDoS
My 2025 Magic: The Gathering…
DARKING
Life Update and thoughts.
FuDDx
How do archons sleep?
8882
StarCraft improvement
iopq
Customize Sidebar...

Website Feedback

Closed Threads



Active: 2024 users

Blizzard Security Breach - Page 17

Forum Index > SC2 General
442 CommentsPost a Reply
Prev 1 15 16 17 18 19 23 Next All
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:19:59
August 10 2012 11:19 GMT
#321
On August 10 2012 20:10 Ganondorf wrote:
Show nested quote +
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:23:50
August 10 2012 11:21 GMT
#322
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bane of every network administrator everywhere.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 11:26:39
August 10 2012 11:26 GMT
#323
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.
multiversed
Profile Joined December 2010
United States233 Posts
August 10 2012 11:28 GMT
#324
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


please don't waste the effort put into this post.

On August 10 2012 20:07 Morfildur wrote:
Show nested quote +
On August 10 2012 19:39 Na_Dann_Ma_GoGo wrote:
@ Morfildur
Aye thanks.

But then there shouldn't be much to worry about at the moment since acquiring the algorithm should be night impossible right?
I mean it shouldn't be straight away available to the hackers and reverse engineering is one hell of a task I'd imagine.



Companies all use standard algorithms and with some practice you can limit the amount of possible algorithms by just looking at the hash, the only factor that can make it hard is the salt and the password complexity.

The more complex the password is, the less likely it's in a rainbow table and the harder it is to brute force.

A more in-depth Explanation:
A password of length 1 that consists of only lowercase characters (a-z) has a complexity of 26^1, i.e. 26.
A password of length 1 that consists of lower- & uppercase has a complexity of 52
A password of length 1 that consists of lower- & uppercase & numbers and a selection of 50 special characters has a complexity of 112.
A password with those properties but of length 2 has a complexity of 112^2, i.e. 12 544
A password of length 10 with only lowercase characters just has a complexity of 26^10, i.e. 141 167 095 653 376
A password of length 10 with the 112 characters has a complexity of 112^10, i.e. 310 584 820 834 420 916 224

complexity means the range of possible passwords that have to be hashed to find the correct password.

If you add a salt of 10 characters from a selection of 112 characters, it suddenly becomes 112^20 which is a 40 digit number.

Now as for the actual time it takes to hash the password and brute force it, the stronger algorithms take longer than simple algorithms like MD5. You can calculate several million up to several billion ( http://www.codinghorror.com/blog/2012/04/speed-hashing.html ) MD5 hashes per second depending on your PC, so to definitively crack the lowercase-only password, it takes a few hours or at most a few days. To crack the complex password it still takes a few weeks.
Other algorithms like SHA256, etc. are slower, so it takes 10-100 times longer to brute force passwords. Add the salt and it suddenly becomes an eternity.

That is why the rainbow tables exist. Basically each lower- & uppercase only combination for passwords of up to 10-15 characters in length is included in rainbow tables which makes a search for it a matter of seconds.

Most of those that steal a huge amount of password hashes don't bother brute forcing, if it's not in the rainbow tables, they ignore those but still might sell or release those users&hashes. That means that someone who targets a specific user/group can still try to brute force the passwords.

So in summary the best way to protect your password is:
1. Have long password using special characters, numbers and a mix of upper and lower characters to maximize it's complexity
2. Hope that the one storing your password uses a strong salt
3. Hope that the one storing your password uses a strong&slow algorithm.

Team Liquid is the used the tampon of the starcraft community.
Ragnarork
Profile Blog Joined June 2011
France9034 Posts
Last Edited: 2012-08-10 11:34:06
August 10 2012 11:33 GMT
#325
On August 10 2012 20:26 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...
LiquipediaWanderer
HaruRH
Profile Blog Joined August 2011
Singapore2780 Posts
August 10 2012 11:40 GMT
#326
Ugh. I was hit by this. My account had been locked and all my game accounts were locked as well. I needed to unlock ALL my game accounts, one by one. I had to bind my account with an authenticator because those blizzard folks won't let me unlock my accounts without one. There you go.
It is fucking D4 and you are still alive as a CONFIRMED FUCKING TOWN. This is how fucking terrible scum thinks you are - Koshi
Broodwurst
Profile Joined June 2011
Germany1586 Posts
August 10 2012 11:46 GMT
#327
On August 10 2012 20:19 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293


Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
paralleluniverse
Profile Joined July 2010
4065 Posts
Last Edited: 2012-08-10 12:05:23
August 10 2012 11:50 GMT
#328
On August 10 2012 20:33 Ragnarork wrote:
Show nested quote +
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as a 10.767 password disallowing upper case characters, which means an 11 letter password not allowing upper case characters is better.
multiversed
Profile Joined December 2010
United States233 Posts
Last Edited: 2012-08-10 11:55:03
August 10 2012 11:54 GMT
#329
On August 10 2012 20:50 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:33 Ragnarork wrote:
On August 10 2012 20:26 paralleluniverse wrote:
On August 10 2012 20:21 multiversed wrote:
it should also be noted that blizzard passwords are not case-sensitive. based on this alone i would be skeptical to leave my well-being in their hands.

i won't bother even adressing those with too much pride to simply change their passwords in these situations, as they will learn the hard way eventually. if not here, elsewhere. everyone does. i've said before and i'll say it again. it's that attitude that is by far the biggest risk to network security and the bain of every network administrator everywhere.

Who cares if their passwords is not case-sensitive. Who uses upper-case letters in their passwords anyway?

In fact, it pisses me off when websites force me to use at least 1 upper-case letter. Why is an upper case letter any more secure than a punctuation mark, a number or even just an extra normal letter. It's well-known that longer passwords with just letters are better than shorter passwords with mixed characters.


It pisses you off when they force you to use 1 upper-case letter, and still, it makes your password gain a few magnitudes of security. They don't do that just to piss you off actually...

An uppercase letter doesn't have the same ASCII code than a lowercase letter.

And actually, if you use a 12 character long password with only lowercase letters, it will be less secured than say a 10 character long password with mixed characters. It's just maths.

EDIT : the previous repost explains way better with numbers, if you don't trust this...

Yes, it is just math, and it's well known that an exponential function, x^a, increases more rapidly as a function of the exponent, a, than it does as a function of the base, x.

On my keyboard I count 32 symbols, 26 letters, and 10 numbers, which is a total of 68. So there are 68^x passwords of length x if we don't allow for upper case. If we do allow for upper case, there are 94 characters, so 94^x passwords of length x.

Now, how much more characters does a password excluding upper case characters need to have before it becomes stronger than one with upper case characters? Well, just solve 68*(x+e) > 94^x for e. The solution is e > x*log(94/68)/log(68) = 0.0767x.

So a 10 letter password allowing for upper case characters has equal strength as an 10.767 password disallowing upper case characters, which means an 11 letter password without upper case is better.

thus not making you an idiot. the math checks out.
Team Liquid is the used the tampon of the starcraft community.
paralleluniverse
Profile Joined July 2010
4065 Posts
August 10 2012 11:56 GMT
#330
On August 10 2012 20:46 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.
Arcanefrost
Profile Blog Joined August 2010
Belgium1257 Posts
August 10 2012 11:57 GMT
#331
what if the hackers need the password resets for their true masterplan, and this is exactly what they want
Valor is a poor substitute for numbers.
Broodwurst
Profile Joined June 2011
Germany1586 Posts
Last Edited: 2012-08-10 12:08:42
August 10 2012 12:08 GMT
#332
On August 10 2012 20:56 paralleluniverse wrote:
Show nested quote +
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:
Fanboys = (ウ╹◡╹)ウ /// I like smiley faces
Blacktion
Profile Joined November 2010
United Kingdom1148 Posts
August 10 2012 12:15 GMT
#333
Meh, even if they got everything from the Europe users it wouldnt effect me much, my account has no payment info linked to it because i bought a physical copy of SC2, the only blizzard game i own.
Also pretty sure i registered it with an email account i almost never use.
Where's Boxer, there's victory! - figq
Kreb
Profile Joined September 2010
4834 Posts
Last Edited: 2012-08-10 12:28:10
August 10 2012 12:27 GMT
#334
On August 10 2012 21:08 Broodwurst wrote:
Show nested quote +
On August 10 2012 20:56 paralleluniverse wrote:
On August 10 2012 20:46 Broodwurst wrote:
On August 10 2012 20:19 paralleluniverse wrote:
On August 10 2012 20:10 Ganondorf wrote:
On August 10 2012 20:01 paralleluniverse wrote:
This has got to be the most weaksauce hack ever.

Literally nothing of value was taken. No accounts will directly be compromised by this.

I will do nothing, I'm not even going to change my password. It would take supercomputers to crack encrypted data.


If you read the thread, that's not certain. Depending how strong the encryption is, the time it takes to bruteforce it can go from a few hours to a few days, or if they really updated the encryption to modern standards, then not even a supercomputer could crack in our lifetime.

The danger lies of course in emails, since alot of people will use the same password and secret question for their email, and maybe even paypal/bank accounts etc..

Given Blizzard's (previously) flawless history with security, I would expect that the passwords would take thousands of years to crack.

And assuming that the passwords are not cracked, which is a very good assumption, as I've never heard of hackers cracking stolen encrypted data, then there is nothing to worry about.

Also, using the same password for email and anything else is highly stupid, as email is nearly always used to verify the account. Security tip: never use your email password for anything else, ever.


Previous flawless history?
http://www.qj.net/mmorpg/titles/warcraftnet-and-battlenet-get-hacked-by-polite-hacker.html
http://suite101.com/article/wow-gets-hacked-in-korea-a48293



First link is essentially as impressive as a DDoS:
[image loading]

Second link: A bunch of idiots got keylogged.


Still not flawless.
Also
http://www.teamliquid.net/forum/viewmessage.php?topic_id=79222
(:

Flawless or not (define 'flawless' in the context first...), your attempts at taking cheap points by posting links about any possible Blizzards mistakes are quite petty. The last one isnt even about Blizzard but about Blizzards employees. Do yourself a favor and stop.

Of course Blizz arent perfect, no one is. But flawless or not, Blizz has very good security in place.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:37
August 10 2012 12:31 GMT
#335
edit: sry, was writing in wrong thread and thus even double posted >.<
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
Na_Dann_Ma_GoGo
Profile Joined March 2010
Germany2959 Posts
Last Edited: 2012-08-10 12:47:50
August 10 2012 12:33 GMT
#336
edit:
WrathBringerReturns said: No no no. Sarcasm is detected in the voice. When this forum is riddled with stupidity, you think I can tell every post apart? Fair enough it was intended sarcastically, was it obvious? Of course not.
SwiftSpear
Profile Joined February 2010
Canada355 Posts
August 10 2012 12:35 GMT
#337
On August 10 2012 19:28 Fuchsteufelswild wrote:
I only just changed my password a couple of months ago and I'm not playing SC2 often nowadays, so stuff it until I get reason to get them to lock it. I have no money on the account.

The people who need to be most concerned are those who use 1 password for everything. At this point, you should consider your username/email and password in the property of criminals, which means you now should change that password everywhere you've used it where you don't want to lose personal data.

I don't care too much, for example, if someone hacks my team liquid account, but if I believed someone had the capability of accessing my banking data I would be remiss to not change that password.
DOUDOU
Profile Joined October 2011
Wales2940 Posts
August 10 2012 12:39 GMT
#338
On August 10 2012 21:31 Na_Dann_Ma_GoGo wrote:
Hmm he adds more Queens instead of using spores, interesting.

yet, slightly irrelevant to the topic
Feast | Grubby | Mvp | Polt | Fantasy | Last | MMA | forGG | Leenock | Soberphano | Scarlett cutiepie
CamoPillbox
Profile Joined April 2012
Czech Republic229 Posts
August 10 2012 12:48 GMT
#339
with patch 1.5 no one cares stolen data cause no one play after this highly game ruiner patch sc2.....case locked.....
Czech Terran(Hots) player
Ryder.
Profile Joined January 2011
1117 Posts
August 10 2012 13:27 GMT
#340
Are we supposed to change our secret question/answer? It is not immediately obvious to me on how to do it myself, does Blizzard expect we contact them and do it or will that not be necessary?
Prev 1 15 16 17 18 19 23 Next All
Please log in or register to reply.
Live Events Refresh
PiG Sty Festival
00:40
Final Tiebreaker Qualifier
Creator vs Nicoract
TBD vs YoungYakov
PiGStarcraft275
LiquipediaDiscussion
[ Submit Event ]
Live Streams
Refresh
StarCraft 2
PiGStarcraft275
SteadfastSC 153
Nathanias 148
StarCraft: Brood War
NaDa 28
Counter-Strike
taco 233
Super Smash Bros
Mew2King101
Other Games
tarik_tv18654
summit1g11066
FrodaN3222
shahzam345
C9.Mang0342
KnowMe202
ToD168
ViBE67
minikerr11
Organizations
Other Games
gamesdonequick744
BasetradeTV77
StarCraft 2
Blizzard YouTube
StarCraft: Brood War
BSLTrovo
sctven
[ Show 16 non-featured ]
StarCraft 2
• Hupsaiya 74
• davetesta40
• musti20045 35
• AfreecaTV YouTube
• intothetv
• Kozan
• IndyKCrew
• LaughNgamezSOOP
• Migwel
• sooper7s
StarCraft: Brood War
• BSLYoutube
• STPLYoutube
• ZZZeroYoutube
Dota 2
• masondota2974
League of Legends
• Scarra1221
Other Games
• Shiphtur272
Upcoming Events
RSL Revival
1h 47m
RSL Revival
6h 47m
LiuLi Cup
9h 47m
Cure vs Reynor
Clem vs Maru
Rogue vs TriGGeR
ByuN vs Serral
uThermal 2v2 Circuit
10h 47m
RSL Revival
16h 47m
AI Arena Tournament
18h 47m
Replay Cast
22h 47m
Sparkling Tuna Cup
1d 8h
LiuLi Cup
1d 9h
Ladder Legends
1d 16h
[ Show More ]
Replay Cast
1d 22h
Replay Cast
2 days
LiuLi Cup
2 days
Wardi Open
2 days
Monday Night Weeklies
2 days
OSC
2 days
WardiTV Winter Champion…
3 days
Replay Cast
4 days
WardiTV Winter Champion…
4 days
Replay Cast
4 days
PiG Sty Festival
5 days
The PondCast
5 days
KCM Race Survival
5 days
WardiTV Winter Champion…
5 days
Replay Cast
5 days
PiG Sty Festival
6 days
Epic.LAN
6 days
Replay Cast
6 days
Liquipedia Results

Completed

Escore Tournament S1: W8
Rongyi Cup S3
Underdog Cup #3

Ongoing

KCM Race Survival 2026 Season 1
LiuLi Cup: 2025 Grand Finals
Nations Cup 2026
PGL Cluj-Napoca 2026
IEM Kraków 2026
BLAST Bounty Winter 2026
BLAST Bounty Winter Qual
eXTREMESLAND 2025
SL Budapest Major 2025

Upcoming

[S:21] ASL SEASON OPEN 1st Round
[S:21] ASL SEASON OPEN 1st Round Qualifier
[S:21] ASL SEASON OPEN 2nd Round
[S:21] ASL SEASON OPEN 2nd Round Qualifier
Acropolis #4
IPSL Spring 2026
HSC XXIX
uThermal 2v2 2026 Main Event
Bellum Gens Elite Stara Zagora 2026
RSL Revival: Season 4
WardiTV Winter 2026
BLAST Rivals Spring 2026
CCT Season 3 Global Finals
FISSURE Playground #3
IEM Rio 2026
PGL Bucharest 2026
Stake Ranked Episode 1
BLAST Open Spring 2026
ESL Pro League Season 23
ESL Pro League Season 23
TLPD

1. ByuN
2. TY
3. Dark
4. Solar
5. Stats
6. Nerchio
7. sOs
8. soO
9. INnoVation
10. Elazer
1. Rain
2. Flash
3. EffOrt
4. Last
5. Bisu
6. Soulkey
7. Mini
8. Sharp
Sidebar Settings...

Advertising | Privacy Policy | Terms Of Use | Contact Us

Original banner artwork: Jim Warren
The contents of this webpage are copyright © 2026 TLnet. All Rights Reserved.