Jump to content

Spotty

Senior Moderator
  • Posts

    12,575
  • Joined

Everything posted by Spotty

  1. Oof. At least they encrypted it, I guess? Also looks like - for the birth dates at least - the encrypted data wasn't salted. The dataset has birth dates in an encrypted state. It includes a separate file (rainbow table) for birthdays which just includes every possible birth date combination and its encrypted value. It's possible to compare the encrypted value from the dataset to the table of birth dates to get the true value. I'm actually surprised that birth dates were encrypted at all. 2021 was when an attempt was made to sell data stolen from AT&T. Apparently this data has been confirmed by AT&T to be from 2019 and include data on current and former customers from 2019 and prior. If it was 2019 then the attacker would have generated every possible birth date combination since 1900 (1900 - 2019 = 119 years). I wonder if that is also the same for the SSNs, since that also includes a separate table for decrypting the values. If SSNs weren't salted and they had the encryption key they could have just generated a table of every possible social security number and their encrypted value.
  2. It's stated on the store page that the images are a digital mock up. For limited edition t-shirt prints they will do a digital mock up of the design and only print the t-shirts after all of the orders have been placed. Printing the shirts after selling them allows them to produce the limited edition shirts in smaller quantities, in a single production run, and with minimal excess inventory. It also allows for a faster turnaround from design -> sale which is usually essential for their limited edition runs to catch the demand while whatever topic is still relevant (in this case April Fools). They've done this for their previous limited edition shirts such as the Gone Phishin (LTT hack) shirt and more recently the Tax Write Off shirt. Digital mock ups allows them to quickly design a shirt and make it available for sale, sometimes within a day, whereas designing a shirt and sending it off to the printer and scheduling it in to be printed, printing samples, receiving the samples, and doing modelling shoots could take weeks to organise by which time they've missed the hype. There probably wouldn't be as much demand for an April Fools shirt sold in June. I believe they're printing the shirts on their standard LTT shirt. If you've purchased any of LTT's shirts recently it should be the same blend. You could also view photos for other shirts, though I'm not sure how much information you could get about the blend from a photo.
  3. These are scam websites. They have no affiliation to Vessi. Only purchase from vessi.com If they do not ship to your country reach out to the customer support on the official site https://vessi.com/pages/contact and ask if there are any authorised sellers. As far as I know they only sell within North America. They also have a list of authorised retailers (NA only): https://vessi.com/pages/retailers If Vessi does not sell in Europe then any website claiming to be Vessi selling in those regions is a scam. I have seen several complaints regarding scam websites impersonating Vessi. For whatever reason the Vessi brand seems like a popular target for scammers. Likely because they're a brand that is heavily promoted on social media and by influencers and likely also because they aren't available in all regions creating demand for the product in regions they do not ship to that the scammers can market to. Here's an older post on the forum from somebody who was scammed by one of these websites. Instead of receiving shoes they received a cheap hat. It's not the only case of scammers impersonating Vessi I've seen though. https://linustechtips.com/topic/1428939-lmg-sponsor-complaints/?do=findComment&comment=15996291 There's only so much LMG (and Vessi) can do to stop scammers impersonating the brand, but like you suggested I think it would be worthwhile calling it out and mentioning to only buy from the official store.
  4. Set the font to comic sans in your sites CSS theme.
  5. Recent budget cuts from LMG meant that we could no longer afford the license for the font pack we were previously using. Comic Sans is the best free alternative.
  6. *tin foil hat* YouTube is only introducing this so when they use YouTube videos to train Google's own video generation AI it allows them to easily filter out AI generated content that may be less desirable as training data.
  7. Spotty

    Status Update

    Chill with the meme spam.
  8. > Moved to Programs, Apps, and Websites. Post is missing the required news articles & quotes from news articles. If you find some news articles covering the topic and update the post to include it let me know and it can be moved back. Tech News Posting Guidelines
  9. The RM850 does not come with a 12VHPWR cable. If you want a white 12VHPWR cable compatible with Corsair power supplies you will need to buy it separately. https://www.corsair.com/us/en/p/pc-components-accessories/cp-8920332/premium-individually-sleeved-12-4pin-pcie-gen-5-12vhpwr-600w-cable-type-4-white-cp-8920332
  10. Yeah, it was re-leaked in the leak-lookup breach that occurred in January 2024. https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/ The demo.zeeroq paste was detected July 2020. Leak-lookup entered it in to their database in August 2022. Leak-lookup was hacked in January 2024. The data leaked on zeeroq in July 2020 is a collection of data stolen from other breaches. Your data was originally stolen from an unknown website some time prior to July 2020. Credit Karma was unaware of the demo.zeeroq paste from July 2020 despite it being a known and documented paste which had been indexed by haveibeenpwned (unknown when) and leak-lookup (August 2022). Credit Karma is only seeing it for the first time from the January 2024 leak-lookup breach when the same data was exposed again.
  11. I have found that back in 2020 there were several pastes of user credentials (lists of emails & passwords) hosted on the zeeroq website. demo.zeeroq.com/email/combos.vip-googlemail.com.txt demo.zeeroq.com/email/combos.vip-icloud.com.txt demo.zeeroq.com/email/combos.vip-comcast.net.txt [apparently there were more collections of data hosted there but with the website down and going off of forum posts from people discussing the pastes that's all I can easily find] It's still possible that these were collections of credentials that zeeroq were using themselves and they were just careless in the way they hosted and managed the data which allowed it to be publicly accessible on their site, but it's also possible that it could have been somebody else (ie. a hacker) using the zeeroq website to host these collections of data. Either way the moral of the story is once your email & password gets out there it will continue to get shared around for years and recycled in to new collections.
  12. That article is AI generated. It's complete fluff. Look at where it says that the company put out statements and responded to the breach - that never happened. It looks like they asked chatgpt to generate an article about a website called "zeeroq.com" suffering a data breached. It's no more insightful than any generic post about what a data breach is and general advice about you should do. This did pique my curiosity though. zeeroq.com did indeed have data exposed in a data breach - or at least a dataset was found that was attributed to it. Leak-lookup.com indexed a databreach for zeeroq.com back in 2022. That was the date leak-lookup indexed it in to their archive (ie. after they found it shared on the dark web) not the date of the original breach. The dataset contained 231 million records stated to include email addresses and passwords. Why are you being alerted to this now? Leak-lookup themselves suffered a databreach in January 2024 and all of the data breaches that they've indexed and stored were stolen. Data breaches from thousands of websites was stolen from leak-lookup This data stolen from leak-lookup has made its way on the dark web and is being shared, data security monitoring services such as your Credit Karma are finding these datasets that were re-leaked from the leak-lookup breach and alerting their users. So what is zeeroq.com? zeeroq.com is currently a parked domain being hosted by a domain parking company called ParkLogic. This company places advertisements on parked (inactive) domains. Most likely the scam message you see when visiting the site advising you that your computer has a virus is an advertisement is being delivered by this domain parking company (probably unknowingly if they don't vet the ads they serve). Using the waybackmachine we can see prior to 2022 when the breached data was indexed we can see that the zeeroq.com website was being used by a digital marketing and web development agency operating under ZeeroQ branding owned by a company called Nirvign Web Solutions that was founded in 2019 and based out of Jaipur India. https://web.archive.org/web/20200703203023/http://zeeroq.com/ In many cases web development and digital marketing companies operating out of India is really just a fancy name for a spam farm. They even advertise themselves as providing marketing services through "Email Marketing" and "promote your business through [...] social media platforms, forums". In other words; Spam. Looking at the dataset of 231M records I extremely doubt those were registered users of this digital marketing and web development website. I think one of two things is far more likely. The dataset was actually hosted on (and stolen from) zeebroq.com. If that digital advertising and web development company really was a spam farm then it's very possible that they were using stolen user data from other websites and breaches for spamming purposes. It's possible Zeeroq was hacked and their collection of user data/credentials was stolen and that dataset/breach that is likely made up of data stolen from various other data breaches was attributed to zeeroq. [Unlikely] The databreach was incorrectly attributed to zeeroq.com. Whoever posted the data to the dark web attributed the data to that website, possibly to obsfucate the actual source. It's possible that hackers took over the zeeroq website at some point to host stolen data they were selling and that's why the breach was attributed to them, but that's also very unlikely. Since you and many other people on Reddit reporting this aren't aware of what zeeroq is, it's likely not data you provided to them and would be data that was collected from other data breaches. Since it's reported to include passwords it wouldn't be a legitimate data brokerage firm selling personal data that you consented to be sold to marketing agencies in some long ToS when signing up to something. For it to include passwords it would have been obtained illegally. I don't see any legitimate reason for a web development/digital marketing company to have 231M records of usernames and passwords. The only reason they would have that data is if they were using it to spam/scam. TLDR; Your data was stolen many years ago from some other unknown website. A spam company from India had your username and passwords in a collection of data likely made up from a collection of other data breaches. The spam company was hacked and their collection of data was stolen. A security company that indexes data breaches that have been shared on the dark web found that data breach being shared back in 2022 and added it to their archive. That security company themselves were hacked in 2024 and the data was stolen again. That stolen data was recently shared on the dark web again after the most recent breach and detected by Credit Karma who alerted you of the breach. Pop your email address in to haveibeenpwned and the Cybernews data leak checker to see a list of known websites your data has been stolen from. If you're using the same password on other websites you should change them immediately. Use unique passwords for each website and enable 2FA where available.
  13. Available job positions at Linus Media Group are advertised on the linusmediagroup.com websites. You can find details on how to apply there. https://linusmediagroup.com/jobs
  14. Do you have any issues with the current cable? Such as not enough clearance between the card and case side panel for the cable to fit without putting a tight bend on the cable? If you don't have any issues with it I would recommend continuing to use the existing 12VHPWR/12V-2x6 cable that came with the power supply.
  15. Moved to Console Gaming. Post does not comply with the Tech News Posting Guidelines.
  16. You've described coil whine on the graphics card. The culprit is most likely the graphics card. Your low end power supply will likely make the problem worse. Switching power supplies might help alleviate the issue, though it's entirely possible a better power supply might make no difference to the coil whine coming from the graphics card. Chieftec is a fairly large and well known brand. The power supply you have does not meet the minimum standards required for 80 Plus efficiency standards, which is the most basic efficiency standards a PSU can achieve. The 85+ logo is not genuine, it's just a fake logo they put on there to copy the 80+ logo. There is no "85+" standards. That low end power supply isn't really suitable for a graphics card with high power draw such as a 6800XT.
  17. Unscrew the GPU from the rear bracket and then push/lift the retention clip on the motherboard slot to release the card. Also a good point that I missed. Lack of HDMI/DisplayPort connectors. A 20 year old graphics card will most likely only have VGA and DVI output.
  18. The iGPU will be better. Better driver support - Will have drivers for modern operating systems and support for DirectX/Vulkan/etc Better encoding support - Will support video encoding and decoding allowing the iGPU to handle video decode like when streaming video from Youtube, Twitch, etc. Older GPUs won't support the GPU decode for modern codecs. Better VRAM - The iGPU will be able to use assigned system memory for VRAM and you could assign more memory to VRAM. The old GPU will likely only have 64-128MB memory which would probably be DDR2 based and much slower than the iGPUs DDR5 memory even when it has to go through the PCIe interconnect to access it. Also, is the old card PCIe? 20+ year old cards could possibly still be AGP, though that would be around the time PCIe was introduced so it's possible it's PCIe. Give the side panel a glancing slap towards the way it would slide off.
  19. Spotty

    Ah, yes. Rootki... I mean... Anti cheat softwar…

    April Fools isn't for another 2 weeks.
  20. Skylake (i5 6600) supports TPM 2.0. Microsoft's decision to not support Skylake CPUs for Windows 11 is not related to TPM support. Microsoft just did not add Skylake to the approved CPU list. I'm not sure if Microsoft ever gave an official reason for not including them. Microsoft is still supporting Windows 10 until October 2025. End of Life for Windows 10 is over 18 months away. Not "very soon" like you claim. It's not like Windows 10 is going to become unusable after that date, it just won't receive further security patches. https://learn.microsoft.com/en-us/lifecycle/products/windows-10-home-and-pro Microsoft is not going to force install Windows 11 on systems that do not support it.
  21. ... Can you play Valorant on Linux? You didn't bring that up when you recommended Linux so why bring it up now when somebody recommended Windows 11? OP asked which of two CPUs are better and you come in telling them to switch to Linux. Don't be that annoying Linux user that goes around everywhere telling people to use Linux when they aren't even asking about it.
  22. Moved to CPUs, Motherboards, and Memory. The i5 6600 will perform better than the i5 2500k and will support DDR4 memory, PCIe 3.0, and depending on the board M.2 NVMe boot storage.
  23. Moved to PC Gaming and locked the thread since discussion is really just people crapping on OP.
  24. There was a data breach on the linustechtips forum 9 years ago. The breach was disclosed at the time and all forum passwords were reset. A website called Leak-lookup collected data from various data breaches and hosted that data on their servers. Leak-lookup was hacked earlier in 2024 and their entire collection of data breaches from thousands of websites were stolen, including the data for the linustechtips.com website from the breach 9 years ago. This old data resurfaced after the Leak-Lookup breach which triggered that warning from Google. https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/ If you're using the same password you used here 9 years ago on other websites you should change those passwords.
  25. Remove the RGB cables from the system. Flip the switch on the back off the power supply off. Flip the switch on the PSU back on. Try to boot the system again. Does it work?
×