For all the talk of the “Twitter Files,” as we’ve detailed, they’ve mostly been, at best, misleading, and frequently actively wrong. One of the big reveals, we were told, wa…
Rose Abramoff (@[email protected]) and I jumped up on a stage at a climate science conference begging our colleagues to speak out. Rose was fired for it.
We are doing everything we can to urge society to address Earth breakdown and we are being censured for it
https://www.nytimes.com/2023/01/10/opinion/scientist-fired-climate-change-activism.html?unlocked_article_code=DI3PwvIX2Yd_NvriwS9l1ZbCprDCWZiLPqEK7FZP72ZErNY-rzzWqv0GfYTvyEQGFLzcsu8Pqll3WOC0KmbOQg1s4um-gf_3LF3FHH6ZBsOvFi9yyOAgn_kl15eN51a3J_6_yDI6RAw3mAzwoDMuAazh5ko8Sek1zGZLxTDVFDrFAKP6oDS1gklZa3CXhP0kZiOAnrOWRk8sApp0jfgAnmgGFufIuT61ffrqs5W6YW1tkdr4obWnBonfxeZFH7Hk39lwjSflSPKfizcFPR83xZmDHHuQxiKf0Ko4NOdT4dKEygqePz48EsD9GYA4wAd-BVkDgwtVaETXTqhCaox-NeXZbMB_Sg6eYnqnSz43-NBB&smid=share-url
Looks like we're getting more information on the most recent LastPass breach:
"To date, we have determined that once the cloud storage access key and dual storage container decryption keys were obtained, the threat actor copied information from backup that contained basic customer account information and related metadata including company names, end-user names, billing addresses, email addresses, telephone numbers, and the IP addresses from which customers were accessing the LastPass service.
The threat actor was also able to copy a backup of customer vault data from the encrypted storage container which is stored in a proprietary binary format that contains both unencrypted data, such as website URLs, as well as fully-encrypted sensitive fields such as website usernames and passwords, secure notes, and form-filled data. These encrypted fields remain secured with 256-bit AES encryption and can only be decrypted with a unique encryption key derived from each user’s master password using our Zero Knowledge architecture. As a reminder, the master password is never known to LastPass and is not stored or maintained by LastPass. The encryption and decryption of data is performed only on the local LastPass client. For more information about our Zero Knowledge architecture and encryption algorithms, please see here.
There is no evidence that any unencrypted credit card data was accessed. LastPass does not store complete credit card numbers and credit card information is not archived in this cloud storage environment."
They went on to say if you picked a weak master password, you should change the passwords it protects.
https://blog.lastpass.com/2022/12/notice-of-recent-security-incident/