So, Cloudflare analyzed passwords people are using to log in to sites they protect and discovered lots of re-use. Let me put the important words in uppercase. So, CLOUDFLARE ANALYZED PASSWORDS PEOPLE ARE USING to LOG IN to sites THEY PROTECT and DISCOVERED lots of re-use. #cloudflare #password #cybersecurity

Replies (11)

JackTheMimic's avatar
JackTheMimic 3 months ago
Wait, how? Array of password hashes on pwnd lists are compared to an array of password hashes in current use. 41% are the same hash. Meaning even after exposure people use the same passwords. What did they misunderstand? That's what I gleaned from it.
JackTheMimic's avatar
JackTheMimic 3 months ago
"When we perform these checks, Cloudflare does not access or store plaintext end user passwords." I mean they could be lying but the article says the opposite.
WHEN THEY PERFORM THE CHECK. But by design cloudflare routes "proxied" your traffic through their servers before. Their certificates. They have 5 levels: - Off (no SSL) - flexible (MITM and the server gets no SSL request) - full (MITM, your server gets SSL requests) - full strict (MITM and they enforce the MITM) - strict (MITM)
JackTheMimic's avatar
JackTheMimic 3 months ago
Lol, yeesh, I need to research them more. I just self-host so much of my shit I almost forget how much people trust nameless faceless orgs with their data.
It's all good. Not like they haven't been collecting IP addresses, browsing habits and passwords since a decade now. At some point they'll argue that only bad people want to have privacy.
Default avatar
G Force G 2 months ago
Could they be analyzing the password hash in actuality?