1393
Comments (235)
sorted by:
You're viewing a single comment thread. View all comments, or full comment thread.
87
grassshrimp 87 points ago +87 / -0

The only thing they get from me is my password that is easily changed, my public post history and my fake e-mail account created to join Gab.

They get absolutely nothing of any value from me at all.

15
deleted 15 points ago +15 / -0
24
deleted 24 points ago +24 / -0
4
Greg-2012 4 points ago +4 / -0

Your IP changes every time you disconnect your modem unless you have a static IP.

6
Husky 6 points ago +6 / -0

That is not usually true. IP changes when the dhcp lease expires

4
Mashiki 4 points ago +6 / -2

Not true. That only happens if your ISP has a large pool of extra addresses. I've had the same IP address for about 6mo now, inc. after two power outages lasting 2+ hours.

If your ISP has fully transitioned to IPv6, you will likely have a static IP forever since they can do IPv4 to IPv6 via NAT in a fully seamless way.

21
grassshrimp 21 points ago +21 / -0

I don't have a dedicated IP address, my provider uses DHCP to allocate addresses, so all anyone would have is a general idea of location. They would have to get a subpoena for my provider to identify me. I live in Cape May County, NJ, I'm not afraid to post it.

Not that I care anyway, I have nothing to hide and I'm totally self sufficient and can't be cancelled.

20
TrumpTrainForever 20 points ago +20 / -0

Thats basically how i feel. Go ahead and send the faggots and trannys after me. I have enough 5.56 for all of them.

14
LibertarianXian 14 points ago +14 / -0

On the bright side, they will never be women.

4
grassshrimp 4 points ago +4 / -0

Never owned a gun in my entire life, in the past year bought 7. Still lacking ammo, but I'm ready to defend my family. Wouldn't hurt a flea unless attacked, then game on.

14
Libertas_Vel_Mors 14 points ago +14 / -0

Thanks to DHCP, knowing someone's naked IP addy will, in most cases, only tell you what ISP they use (unless they specifically pay for a static one).

I'm on a rural ISP, which means that even if I didn't use a VPN, the potential dox'er would have parts of five counties across two states to search.

8
JokerPede 8 points ago +8 / -0

Source IP wasn't mentioned in the breach but that doesn't mean that data doesn't exist.

4
deleted 4 points ago +4 / -0
3
Artymisfoul 3 points ago +3 / -0

Cloudflare owned by prominent Dems

10
BaldyGull 10 points ago +10 / -0

"Encrypted password" which is useless because that is the point of encryption. Also, password managers are great. Highly suggest using one. Just got a new device and I could log into everything effortlessly and URL spoofing does not work because the manager only inputs info on the correct URL.

6
deleted 6 points ago +6 / -0
2
BaldyGull 2 points ago +2 / -0

You can figure it out, but it takes some time. Always use good passwords, and it will go a long way. Also, for every breach you hear about, there are plenty more you don't.

2
SordidPontification 2 points ago +2 / -0

A 16 character password randomly consisting of upper and lower case letters and numbers only using bcrypt with a cost factor of 10 would take ~6.046727765959351e+18 years to crack on a single Nvidia 2080Ti.

The Gab passwords are hashed using bcrypt. I don't know what their cost factor was configured as.

2
deleted 2 points ago +2 / -0
3
DiscoverAFire 3 points ago +3 / -0

If your password is a word or a common word/number combination, and I have the encrypted hash, I can break it in a few hours, maybe a day. (edit: ran the calculations for another post, it takes 25 minutes to crack any common password, even with bcrypt)

If it's not, it might take days-weeks depending on how long it is and which algorithm they used. If it's under 8 characters, there are databases that can break it instantly. (Edit: As sordifPontification points out, these don't apply to bcrypt, especially if it's salted as it should be)

3
SordidPontification 3 points ago +3 / -0

No.

Gab is based on Mastodon which uses bcrypt to store password hashes. There are no rainbow tables for bcrypt for anything 8 characters or less. For under 8 characters, the rainbow tables would be ~211 296 876 372 480 bytes in size. Plausible given current storage but very unlikely.

Edit: And this calculation is probably off by an order of magnitude as I forgot about the salt and was basing this off the hash length.

Edit edit: Plus a 16 byte salt renders rainbow tables completely useless.

1
DiscoverAFire 1 point ago +1 / -0

Good points on the bcrypt part. Editing my post above

2
Husky 2 points ago +2 / -0

It's been a long time since I've done anything in that world, How are passwords that consist of several real words with no numbers or symbols?

2
deleted 2 points ago +2 / -0
1
DiscoverAFire 1 point ago +1 / -0

Several real words (3+) are very safe. Easy to remember and it just takes exponentially long for any algorithm to work it's way up to that point.

1
BaldyGull 1 point ago +1 / -0

Yep. Another reason for password manager. Have 20+ character passwords that are random and use all possible characters.

2
infojunkie07 2 points ago +2 / -0

im less worried about hashed passwords than the statements beign made that the site was vulnerable to sql injection that byasses passwords. Its basic security vulnerability 101 and shouldnt have existed.

1
deleted 1 point ago +1 / -0
1
Cantshadowbanthemall 1 point ago +1 / -0

Having different passwords for email, for each bank, from whatever, from social media is the way to prevent being harmed by hacks.

It is usually the lower security sites that get compromised then they use that information to target the valuable stuff