Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

May 19 2017

6628 d790 500

I know, right?

6631 216b 500

jhn brssndn turned 10 today!

Well, not today, but on 6 May. Yay!

May 12 2017

3097 198e 500

Someone has been at my desk. Someone who thinks I’m Dwight Shrute.

April 18 2017


April 12 2017

6100 dcd4 500


April 03 2017

2616 099e 500

The Department of Health seems to have a new head of advertising.

March 21 2017

2617 f97b 500

New wheels.

March 20 2017

2148 df2d 500

Fire dog.

September 26 2016

4741 0c36 500

September 04 2016

4748 abf2 500

My breakfast heard some juicy gossip on the phone.

August 26 2016

4782 377f 500

#kennedycitybicycles (at Southampton Common)

August 24 2016

4796 4782 500

Taken on 9 May. The symmetry between “England’s Dreaming”, and a bookmark torn from the government’s official “Remain” booklet, between 1976 and 2016, seems even more striking now. “England wasn’t free and easy. It was repressed and horrible.”

August 19 2016

4810 339d 500

Gin, by night.

August 17 2016

4835 7a3b 500

Through a glass.

July 15 2016

4851 bd73 500

Little dog in a big, big world.

May 31 2016




Hackers Stole 65 Million Passwords From Tumblr, New Analysis Reveals

Written by

Lorenzo Franceschi-Bicchierai

Staff Writer

May 30, 2016 // 04:00 AM EST                               

On May 12, Tumblr revealed that it had just found out about a 2013 data breach affecting “a set” of users’ email addresses and passwords, but the company refused to reveal how many users were affected.

As it turns out, that number is 65 million, according to an independent analysis of the data.

Troy Hunt, a security researcher who maintains the data breach awareness portal Have I Been Pwned, recently obtained a copy of the stolen data set.

Hunt told Motherboard that the data contained 65,469,298 unique emails and passwords. (Tumblr did not immediately respond to a request to confirm the figure).

The passwords, however, were not in plaintext, but were “hashed,” a process that turns the actual password into a different string of digits. The company also added a series of random bytes at the end of the passwords before hashing them, or “salted” them, as Tumblr said when it disclosed the breach. The company, however, didn’t say exactly what algorithm it used to hash the passwords.

Since Tumblr’s announcement, the hacked data appears to have been circulating within the internet underground. A hacker known as Peace, who also claims to have the data and was selling it on the darknet marketplace The Real Deal, said Tumblr used SHA1 to hash the passwords. Given that it also used salt, they are very hard for hackers to crack.

That’s why, Peace told me, the data was essentially just a list of emails, and he was only able to sell it for $150.

In any case, considering the age of the breach and the bad practices that were used at the time across websites, it’s fair to assume half of the passwords could be cracked, according to Hunt.

This data breach is now listed on Have I Been Pwned as the third largest ever, after the hack of 164 million LinkedIn accounts and the breach of 152 million Adobe accounts. You can check there to find out if you were a victim, though you should’ve been notified by Tumblr when the company forced users to reset passwords after announcing the breach….

4885 45c7 500

jhn brssndn turned 9 on 6 May!

March 24 2016

4911 a5f0


This Kid Is Some Kind Of Genius

This Kid Is Some Kind Of Encapsulation Of Our Dystopian Present

4946 e50f 500

Or you could, you know, have a fucking baby. Or adopt. Or get a rescue dog.

4974 aafd 500

Every meal sounds Weimar-level scary if you translate it into German. For example, “burger night” becomes “Burgernacht”. “Pulled pork night” becomes “Zogschweinfleischnacht”. See what I mean?

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!