A self-proclaimed data enthusiast calling themselves ‘ThinkingOne’ has made a huge database containing 201 million pieces of user data from X freely available. The data is said to have come from two previous leaks and includes email addresses, locations and profile data of users of the social media platform.

  • mbirth 🇬🇧@lemmy.ml
    link
    fedilink
    English
    arrow-up
    197
    ·
    1 年前

    This vulnerability made it possible to collect user data simply by knowing someone’s email address or phone number.

    Another example of where it pays off to have separate email addresses/aliases for every website/service you use.

      • adry@piefed.social
        link
        fedilink
        English
        arrow-up
        42
        arrow-down
        65
        ·
        1 年前

        That’s re-victimization. People do people stuff, like using social networks. Furthermore, the database probably goes as far as previous to being bought, enshittified and renamed by Musk. So… you’re not being fair.

        • themeatbridge@lemmy.world
          link
          fedilink
          English
          arrow-up
          75
          arrow-down
          2
          ·
          1 年前

          I think there’s a fine line between victim-blaming and identifying an object lesson. We all understand why people started using twitter, and people are creatures of habit. But this is an example of why people should stop using twitter. We’re not saying “this is your fault because you’re stupid if you’re still on twitter.” The message is “this should serve as a wake up call to anyone stuck in their habits.”

        • Optional@lemmy.world
          link
          fedilink
          English
          arrow-up
          35
          arrow-down
          2
          ·
          1 年前

          That’s re-victimization. People do people stuff, like using social networks.

          Giving one’s real name and real information to a social network who is intending to track everything one does or says and the people one does or says it with is idiocy and it has never not been.

          People do people stuff like not listening to people who have constantly been telling them not to push the button.

          People stuff also includes continuing to use these horror networks for years after knowing full well they shouldn’t.

        • Pirata@lemm.eedeleted by creator
          link
          fedilink
          English
          arrow-up
          11
          ·
          1 年前

          I’m fairy sure the guy above said “use X” not use social media. X is a particularly shitty platform.

        • booly@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          2
          ·
          1 年前

          The actual data compromise happened sometime before July 2022, months before Elon’s purchase of Twitter happened. Telling people they shouldn’t have registered their real phone numbers to Twitter in 2015 or whatever isn’t really a helpful argument to make today.

      • mbirth 🇬🇧@lemmy.ml
        link
        fedilink
        English
        arrow-up
        32
        ·
        1 年前

        My email provider allows for unlimited aliases. So, while I have 600+ email addresses, emails to them all end up in the same mailbox.

        The accounts for all the websites and services (with their specific email address) are in a KeePass database and they all have random passwords, too.

        The only small issue is when you have to contact support of some service. Then, I have to configure the specific email address in my client so they can match that to my account with them. But most email clients allow multiple sender addresses without having to fiddle with the rest of the settings.

        • partial_accumen@lemmy.world
          link
          fedilink
          English
          arrow-up
          14
          ·
          1 年前

          My email provider allows for unlimited aliases. So, while I have 600+ email addresses, emails to them all end up in the same mailbox.

          I do this too. The unique email address I create for each is identifiable to the place I’m using it. This has other benefits. If an organization you created and account with sells or has a data breech you know exactly which company it was when you start receiving spam or phishing email directed to that address. This is also nice because you can “black hole” that email address and all the spam goes with it even future spam not sent yet.

          • mbirth 🇬🇧@lemmy.ml
            link
            fedilink
            English
            arrow-up
            16
            ·
            1 年前

            Exactly! I add a random string to each email address, too, so you can’t just guess other addresses. So, it’s usually something similar to lemmy-r4nd0m@mydomain.me. And, whenever a breach happens, I’ll generate a new random part and set that as my email address and invalidate the old one. Until the next breach. (Looking at you, LinkedIn…)

        • Gibibit@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 年前

          Thanks for the guide on how to switch. I’ve been using a mail provider with my own domain for a while now. I’m not unhappy with their service but they only let me make a few inboxes. Good to know switching can be seamless.

        • Appoxo@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          ·
          1 年前

          How do you reply to those emails in case of needing to contact with said company.
          I’d assume they would deny service if the user (even on the same custom domain) is not equal to the account holder.

        • max_dryzen@mander.xyz
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          1 年前

          wouldn’t profilers simply track via the domain tld instead of the whole address…shopping1 at uniquedomain, bank2 at uniquedomain , etc

          and in the case of aliasing, couldnt a domain provider tell where the aliases rout to and sell that info as a side earner?

      • NikoWantToGoBowling@lemm.ee
        link
        fedilink
        English
        arrow-up
        16
        arrow-down
        1
        ·
        1 年前

        Password manager plus an emailing alias service. Protonpass integrates with SimpleLogin but there’s also ones like Firefox relay and anomaly (all open source)

      • suicidaleggroll@lemm.ee
        link
        fedilink
        English
        arrow-up
        11
        ·
        1 年前

        Yes, and Bitwarden+SimpleLogin. Bitwarden to keep track of login info including the alias that is used for that site. SimpleLogin is where the aliasing is actually handled, they have a decent UI for enabling/disabling or generating reverse aliases (for outgoing emails) when needed.

        It does take a little more effort to manage it, but it’s worth the payoff. I’ve been using this setup for about 9 months now and I finally got my first spam email a week ago. I looked at the address it was sent to, it was an alias I used at a site I ordered something from about 6 months ago. I sent them a message letting them know that either someone at their company is selling customer info to scammers or their database has been leaked, then I shut off the alias. No more spam.

        • brbposting@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          3
          ·
          1 年前

          I sent them a message letting them know that either someone at their company is selling customer info to scammers or their database has been leaked, then I shut off the alias.

          🫡

      • ploot@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 年前

        My email provider will auto-generate aliases with no limit, and I also subscribe to Mozilla Firefox Relay, which allows me to invent email addresses on the fly and have them relay emails to my inbox. The advantage of the Firefox Relay is that it isn’t tied to the email provider so if I switch provider the aliases can still work.

          • ploot@lemmy.blahaj.zone
            link
            fedilink
            English
            arrow-up
            2
            ·
            1 年前

            No, I’m on Fastmail. It’s full-featured and has a slick web UI, but it’s not as good for privacy as Tuta, Proton, etc. Also, although Fastmail is Australian they apparently host their servers in the USA.

      • Ideonek@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        arrow-down
        1
        ·
        1 年前

        Proton Pass has a feature exactly for that. You can create unlimited number of aliases, and kill ones that bacame compromised.

    • SippyCup@feddit.nl
      link
      fedilink
      English
      arrow-up
      51
      ·
      1 年前

      Seems like a dedicated person might be able to prove that. Go through the available data and see what % of leaked accounts actually point to a real person, or even a unique person. If it’s mostly bots you’d see that pretty quick

      • GenosseFlosse@feddit.org
        link
        fedilink
        English
        arrow-up
        28
        arrow-down
        1
        ·
        1 年前

        Check how many accounts pushing republican propaganda only post during St. Petersburg business hours… 🙃

    • Obelix@feddit.org
      link
      fedilink
      English
      arrow-up
      16
      ·
      1 年前

      Exactly this. We knew that everything would get shaky after he fired all those people and a data leak is the consequence

    • TacticalCheddar@lemm.eedeleted by creator
      link
      fedilink
      English
      arrow-up
      8
      ·
      1 年前

      It also includes the people that deleted their Twitter accounts following the acquisition. I’m one of those people and I’m especially annoyed because I only used that blasted app only to register to some giveaways when I was in middle school. I have since discontinued that email account, but still.

    • Rose@slrpnk.net
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 年前

      If it had happened now, that figure might be accurate. However, this was originally exploited in 2022, so it’s probably pretty bad.

  • pivot_root@lemmy.world
    link
    fedilink
    English
    arrow-up
    30
    ·
    1 年前

    Someone should check the email and phone number of Adrian Dittman to see if they match Elon’s. Idiots can argue that it isn’t Elon despite speech pattern evidence, but it’s harder to argue when both of them share the same identifying info.

  • answersplease77@lemmy.world
    link
    fedilink
    English
    arrow-up
    28
    ·
    1 年前

    this leak has proven in the past to be fatally dangerous to anonymous activists fighting tyrant governments all around the world. let’s hope it does not fall into the wrong hands

    • PurpleSkull@lemm.ee
      link
      fedilink
      English
      arrow-up
      18
      arrow-down
      5
      ·
      1 年前

      If you use anything but TOR together with spoofed VPNs for “activism” against a government that would jail/kill you, you are being reckless.

      If you use X for your activism, you’re not an activist you’re a fed honeypot.

      • interdimensionalmeme@lemmy.ml
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 年前

        It’s not realistic to expect your average civic minded person to also have such operational securitt. Instead the bad actors who threaten them should found, exposed, dismantled, persecuted with extreme prejudice

    • buddascrayon@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      1
      ·
      1 年前

      It fell into the wrong hands 3 years ago. If those people failed to recognize the danger they put themselves in by continuing to use the platform they are shit out of luck cause Musk will never take responsibility.

  • itisileclerk@lemmy.world
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    2
    ·
    1 年前

    Or this could be publicity stunt “look how many users we have, many users, beutifull users like never before, nobody knew how many users as there”.

  • Optional@lemmy.world
    link
    fedilink
    English
    arrow-up
    16
    ·
    1 年前

    In July 2022, Twitter confirmed that someone had exploited the vulnerability before it could be fixed. “After reviewing a sample of the data offered for sale, we confirmed that a malicious party had taken advantage of the problem before it was addressed,” Twitter stated at the time.

    lol