Jump to content

Spotty

Senior Moderator
  • Posts

    12,567
  • Joined

Everything posted by Spotty

  1. > Moved to Off Topic. Door handles and motor vehicle safety are not Tech News. Tech News means news regarding technology or gaming. Please don't post topics in this forum that don't have a strong relation to technology/games.
  2. Can you describe what the actual performance issues are? Gaming? If so, what game(s)? What resolution and settings are you playing on? What fps are you receiving on the 4070? How does it compare to the 2070S? If you swap the card back to the 2070S does performance improve? It can be a good idea to enable an on screen performance display or logging while checking this to help diagnose the issue. MSI afterburner has an OSD built in that will display things like CPU, GPU, memory usage, temperatures, etc.
  3. Just some garbage website writing fake articles putting popular key words on the page to trick people in to visiting the site.
  4. Likely your email address was exposed in an unrelated breach and now attackers are trying that email and password combination to try and access your account. Hopefully the reason it's unsuccessful is because you're using unique passwords. For extra protection you should enable MFA (Multi Factor Authentication) to the Microsoft account.
  5. Moved to Programs, Apps, and Websites. A requirement for the Tech News section is reputable news articles reporting the topic. Tech News Posting Guidelines. Just cancel and migrate to a different password manager. There's plenty of options to choose from and most will allow you to import passwords stored in another manager.
  6. Yes. You only need to use the adapter cable that goes to 3 PCIe cables if your power supply does not have a 12VHPWR cable. Since your power supply has the 12VHPWR cable you can just use that instead of the adapter cable and PCIe cables.
  7. The 4k versions will typically have a higher bitrate and should provide better visual quality even when displayed on a lower resolution monitor. Here's an example of the most recent LTT video at 1080p and 4k displayed on the same screen with the same viewing window (2236x1118). There's some noticeable difference around the face and hair. The eyebrows, cheeks, nose, and hair look a little smudgey and less detailed on 1080p compared to 4k.
  8. Oof. At least they encrypted it, I guess? Also looks like - for the birth dates at least - the encrypted data wasn't salted. The dataset has birth dates in an encrypted state. It includes a separate file (rainbow table) for birthdays which just includes every possible birth date combination and its encrypted value. It's possible to compare the encrypted value from the dataset to the table of birth dates to get the true value. I'm actually surprised that birth dates were encrypted at all. 2021 was when an attempt was made to sell data stolen from AT&T. Apparently this data has been confirmed by AT&T to be from 2019 and include data on current and former customers from 2019 and prior. If it was 2019 then the attacker would have generated every possible birth date combination since 1900 (1900 - 2019 = 119 years). I wonder if that is also the same for the SSNs, since that also includes a separate table for decrypting the values. If SSNs weren't salted and they had the encryption key they could have just generated a table of every possible social security number and their encrypted value.
  9. It's stated on the store page that the images are a digital mock up. For limited edition t-shirt prints they will do a digital mock up of the design and only print the t-shirts after all of the orders have been placed. Printing the shirts after selling them allows them to produce the limited edition shirts in smaller quantities, in a single production run, and with minimal excess inventory. It also allows for a faster turnaround from design -> sale which is usually essential for their limited edition runs to catch the demand while whatever topic is still relevant (in this case April Fools). They've done this for their previous limited edition shirts such as the Gone Phishin (LTT hack) shirt and more recently the Tax Write Off shirt. Digital mock ups allows them to quickly design a shirt and make it available for sale, sometimes within a day, whereas designing a shirt and sending it off to the printer and scheduling it in to be printed, printing samples, receiving the samples, and doing modelling shoots could take weeks to organise by which time they've missed the hype. There probably wouldn't be as much demand for an April Fools shirt sold in June. I believe they're printing the shirts on their standard LTT shirt. If you've purchased any of LTT's shirts recently it should be the same blend. You could also view photos for other shirts, though I'm not sure how much information you could get about the blend from a photo.
  10. These are scam websites. They have no affiliation to Vessi. Only purchase from vessi.com If they do not ship to your country reach out to the customer support on the official site https://vessi.com/pages/contact and ask if there are any authorised sellers. As far as I know they only sell within North America. They also have a list of authorised retailers (NA only): https://vessi.com/pages/retailers If Vessi does not sell in Europe then any website claiming to be Vessi selling in those regions is a scam. I have seen several complaints regarding scam websites impersonating Vessi. For whatever reason the Vessi brand seems like a popular target for scammers. Likely because they're a brand that is heavily promoted on social media and by influencers and likely also because they aren't available in all regions creating demand for the product in regions they do not ship to that the scammers can market to. Here's an older post on the forum from somebody who was scammed by one of these websites. Instead of receiving shoes they received a cheap hat. It's not the only case of scammers impersonating Vessi I've seen though. https://linustechtips.com/topic/1428939-lmg-sponsor-complaints/?do=findComment&comment=15996291 There's only so much LMG (and Vessi) can do to stop scammers impersonating the brand, but like you suggested I think it would be worthwhile calling it out and mentioning to only buy from the official store.
  11. Set the font to comic sans in your sites CSS theme.
  12. Recent budget cuts from LMG meant that we could no longer afford the license for the font pack we were previously using. Comic Sans is the best free alternative.
  13. *tin foil hat* YouTube is only introducing this so when they use YouTube videos to train Google's own video generation AI it allows them to easily filter out AI generated content that may be less desirable as training data.
  14. Spotty

    Status Update

    Chill with the meme spam.
  15. > Moved to Programs, Apps, and Websites. Post is missing the required news articles & quotes from news articles. If you find some news articles covering the topic and update the post to include it let me know and it can be moved back. Tech News Posting Guidelines
  16. The RM850 does not come with a 12VHPWR cable. If you want a white 12VHPWR cable compatible with Corsair power supplies you will need to buy it separately. https://www.corsair.com/us/en/p/pc-components-accessories/cp-8920332/premium-individually-sleeved-12-4pin-pcie-gen-5-12vhpwr-600w-cable-type-4-white-cp-8920332
  17. Yeah, it was re-leaked in the leak-lookup breach that occurred in January 2024. https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/ The demo.zeeroq paste was detected July 2020. Leak-lookup entered it in to their database in August 2022. Leak-lookup was hacked in January 2024. The data leaked on zeeroq in July 2020 is a collection of data stolen from other breaches. Your data was originally stolen from an unknown website some time prior to July 2020. Credit Karma was unaware of the demo.zeeroq paste from July 2020 despite it being a known and documented paste which had been indexed by haveibeenpwned (unknown when) and leak-lookup (August 2022). Credit Karma is only seeing it for the first time from the January 2024 leak-lookup breach when the same data was exposed again.
  18. I have found that back in 2020 there were several pastes of user credentials (lists of emails & passwords) hosted on the zeeroq website. demo.zeeroq.com/email/combos.vip-googlemail.com.txt demo.zeeroq.com/email/combos.vip-icloud.com.txt demo.zeeroq.com/email/combos.vip-comcast.net.txt [apparently there were more collections of data hosted there but with the website down and going off of forum posts from people discussing the pastes that's all I can easily find] It's still possible that these were collections of credentials that zeeroq were using themselves and they were just careless in the way they hosted and managed the data which allowed it to be publicly accessible on their site, but it's also possible that it could have been somebody else (ie. a hacker) using the zeeroq website to host these collections of data. Either way the moral of the story is once your email & password gets out there it will continue to get shared around for years and recycled in to new collections.
  19. That article is AI generated. It's complete fluff. Look at where it says that the company put out statements and responded to the breach - that never happened. It looks like they asked chatgpt to generate an article about a website called "zeeroq.com" suffering a data breached. It's no more insightful than any generic post about what a data breach is and general advice about you should do. This did pique my curiosity though. zeeroq.com did indeed have data exposed in a data breach - or at least a dataset was found that was attributed to it. Leak-lookup.com indexed a databreach for zeeroq.com back in 2022. That was the date leak-lookup indexed it in to their archive (ie. after they found it shared on the dark web) not the date of the original breach. The dataset contained 231 million records stated to include email addresses and passwords. Why are you being alerted to this now? Leak-lookup themselves suffered a databreach in January 2024 and all of the data breaches that they've indexed and stored were stolen. Data breaches from thousands of websites was stolen from leak-lookup This data stolen from leak-lookup has made its way on the dark web and is being shared, data security monitoring services such as your Credit Karma are finding these datasets that were re-leaked from the leak-lookup breach and alerting their users. So what is zeeroq.com? zeeroq.com is currently a parked domain being hosted by a domain parking company called ParkLogic. This company places advertisements on parked (inactive) domains. Most likely the scam message you see when visiting the site advising you that your computer has a virus is an advertisement is being delivered by this domain parking company (probably unknowingly if they don't vet the ads they serve). Using the waybackmachine we can see prior to 2022 when the breached data was indexed we can see that the zeeroq.com website was being used by a digital marketing and web development agency operating under ZeeroQ branding owned by a company called Nirvign Web Solutions that was founded in 2019 and based out of Jaipur India. https://web.archive.org/web/20200703203023/http://zeeroq.com/ In many cases web development and digital marketing companies operating out of India is really just a fancy name for a spam farm. They even advertise themselves as providing marketing services through "Email Marketing" and "promote your business through [...] social media platforms, forums". In other words; Spam. Looking at the dataset of 231M records I extremely doubt those were registered users of this digital marketing and web development website. I think one of two things is far more likely. The dataset was actually hosted on (and stolen from) zeebroq.com. If that digital advertising and web development company really was a spam farm then it's very possible that they were using stolen user data from other websites and breaches for spamming purposes. It's possible Zeeroq was hacked and their collection of user data/credentials was stolen and that dataset/breach that is likely made up of data stolen from various other data breaches was attributed to zeeroq. [Unlikely] The databreach was incorrectly attributed to zeeroq.com. Whoever posted the data to the dark web attributed the data to that website, possibly to obsfucate the actual source. It's possible that hackers took over the zeeroq website at some point to host stolen data they were selling and that's why the breach was attributed to them, but that's also very unlikely. Since you and many other people on Reddit reporting this aren't aware of what zeeroq is, it's likely not data you provided to them and would be data that was collected from other data breaches. Since it's reported to include passwords it wouldn't be a legitimate data brokerage firm selling personal data that you consented to be sold to marketing agencies in some long ToS when signing up to something. For it to include passwords it would have been obtained illegally. I don't see any legitimate reason for a web development/digital marketing company to have 231M records of usernames and passwords. The only reason they would have that data is if they were using it to spam/scam. TLDR; Your data was stolen many years ago from some other unknown website. A spam company from India had your username and passwords in a collection of data likely made up from a collection of other data breaches. The spam company was hacked and their collection of data was stolen. A security company that indexes data breaches that have been shared on the dark web found that data breach being shared back in 2022 and added it to their archive. That security company themselves were hacked in 2024 and the data was stolen again. That stolen data was recently shared on the dark web again after the most recent breach and detected by Credit Karma who alerted you of the breach. Pop your email address in to haveibeenpwned and the Cybernews data leak checker to see a list of known websites your data has been stolen from. If you're using the same password on other websites you should change them immediately. Use unique passwords for each website and enable 2FA where available.
  20. Available job positions at Linus Media Group are advertised on the linusmediagroup.com websites. You can find details on how to apply there. https://linusmediagroup.com/jobs
  21. Do you have any issues with the current cable? Such as not enough clearance between the card and case side panel for the cable to fit without putting a tight bend on the cable? If you don't have any issues with it I would recommend continuing to use the existing 12VHPWR/12V-2x6 cable that came with the power supply.
  22. Moved to Console Gaming. Post does not comply with the Tech News Posting Guidelines.
×