136
submitted 11 hours ago* (last edited 7 hours ago) by TehBamski@lemmy.world to c/til@lemmy.world

Nerdy leaked passwords:

Treebeard - "This password has been seen 1,207 times before in data breaches!"

NedStark - 20 times

CerseiLannister - 30 times

youknownothingjonsnow - 61 times

PicardIsSexy - 0 times (!The_Picard_Maneuver@piefed.world you're safe. ;)

edit:

Gandalf1 - 53,478

Gandalfthewhite - 51


NSFW leaked passwords:

spoilerbigdick - 178,712 (!?!)

bigpussy - 9,226

longpussy - 26

longdick - 10,762

wetpussy - 61,575

wetdick - 579

twat - 6,588

dickhead - 201,942


Weird leaked passwords:

((More to come later))

all 43 comments
sorted by: hot top new old
[-] pageflight@piefed.social 2 points 1 hour ago* (last edited 1 hour ago)

1234: 30,272,674 times

/headdesk

[-] TehBamski@lemmy.world 1 points 55 minutes ago

I felt about the same way when I tested for that. hahaha.

Try some keyboard walking combos. You'll start see why so many people in I.T. are bald at early ages, starting to have grey hair before they hit 50, etc. lol

Examples: qwer ., asdf , zxcv , qweasdzxc

[-] Darkassassin07@lemmy.ca 56 points 10 hours ago* (last edited 10 hours ago)

For those worried about inputting a password into a tool like this, they've actually done a great job keeping your pass secure.

Passwords entered on this site do not get transmitted to the server. Instead, they are hashed, then only the first half of the hash is sent to the server. The server replies with a list of every password hash they've found in leaks that match the partial hash you sent them. Your computer then looks through the list and tells you if the password you entered (which was kept on your pc, not transmitted) exists in that list.

From Haveibeenpwneds perspective; they sent you a big list of potential matches, but don't know which one if any actually matches your password, because they were never given the full hash, let alone the raw password.

There's even an open-source script you can run that does this within a console instead of a browser. Or, you can download their whole password DB via their github tools, then check it entirely offline.

[-] thejml@sh.itjust.works 8 points 10 hours ago

So, a malicious JavaScript library update then...

The open-source local script might be better, I'll have to check into that!

[-] Darkassassin07@lemmy.ca 13 points 10 hours ago

You could say the same about every password entry field; but that's why there are local/alternative options here.

[-] THE_GR8_MIKE@lemmy.world 44 points 11 hours ago

I don't know if I want to be putting my passwords in to something like this lol

[-] panda_abyss@lemmy.ca 43 points 10 hours ago

If you’re worried, send them to me and I’ll check for you.

[-] Lawnman23@lemmy.world 31 points 10 hours ago
[-] panda_abyss@lemmy.ca 10 points 9 hours ago

Yeah that one is used, you should change it

[-] masta_chief@sh.itjust.works 25 points 9 hours ago
[-] zr0@lemmy.dbzer0.com 7 points 8 hours ago

Oh lol that one is old

[-] Vupware@lemmy.zip 3 points 7 hours ago

Password123!

[-] FiskFisk33@startrek.website 20 points 10 hours ago* (last edited 10 hours ago)

very sane reaction.

I have to say though, haveibeenpwned is very well regarded in the industry, and is run by a well known security expert. A leak from there would be quite the blow to his reputation.

https://en.wikipedia.org/wiki/Have_I_Been_Pwned

That said, while I happily give them my email-addresses, I have never given them my password.

[-] nogooduser@lemmy.world 12 points 9 hours ago

A leak from there would be quite the blow to his reputation.

I’m not so sure that it would be a huge blow. He’s only human and everyone is susceptible to the odd mistake.

He did get phished last year and blogged about it after it happened which is the transparent approach that security experts say is the correct response. I’m pleased that he followed the advice that he gives to be honest and don’t think any less of him for suffering a breach.

https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/

[-] FiskFisk33@startrek.website 5 points 8 hours ago

Fair, I misstated that. A deliberate leak from there would be quite the blow to his reputation.

[-] thejml@sh.itjust.works 3 points 10 hours ago

All it takes is a malicious actor to MITM or a compromised codebase or any other malicious things to slip in something and its also pwned.

I've seen too many widely recognized and supposedly secure things fail, to trust this with my passwords.

[-] FiskFisk33@startrek.website 3 points 10 hours ago* (last edited 10 hours ago)

I'd argue though, if you use a single password for everything, its probably more secure to add it here to at least get an indication when it's breached. Your surface in that case is already so large that the difference is negligible compared to the gained warning.

That said, don't reuse passwords!

[-] Tetsuo@jlai.lu 1 points 8 hours ago* (last edited 8 hours ago)

I suppose they use JavaScript to hash your password locally so all haveibeenpwned has is your hash.

It's certainly not full proof but it means a simple MITM attack wouldn't be that bad.

The risk would be that the JavaScript in question would be compromised for the whole service. Also if the machine of the user is already compromised well I would argue that password is already useless anyway. If someone has a keylogger on your system, ihavebeenpwnd would be the least of your concern.

So it's never foolproof but some risk can be mitigated.

Hashes are a powerful tool enabling easy check of leaks without exposing directly any user password.

Edit: Hmm there is much better explanations than mine on hashes on here, probably disregard the above comment.

[-] NachBarcelona@piefed.social -4 points 10 hours ago

very sane reaction

I hope for humanity's sake that you're joking.

[-] homoludens@feddit.org 3 points 10 hours ago
[-] NachBarcelona@piefed.social 2 points 9 hours ago

Because using a reputable k-anonymity service is as risky as throwing apple peels in the trash. Or just looking at an apple.

[-] THE_GR8_MIKE@lemmy.world 1 points 9 hours ago

Same person said that to me too and refuses to elaborate. Really strengthens their argument.

[-] AnyOldName3@lemmy.world 7 points 10 hours ago

It makes a cryptographically-secure hash of the password you enter, then truncates that before sending it to the server so the only information they get would be in common with a huge number of other passwords. They then send back the leaked passwords with the same truncated hash, and your computer checks to see if what you've entered matches anything on the list. It's not practical to send the whole list for every query as there's just too much data, but if you don't trust their site, you can just download the whole list and check against it yourself.

[-] HubertManne@piefed.social 3 points 10 hours ago

Yeah its fine to look through a list but not going to put in my stuff.

[-] Darkassassin07@lemmy.ca 1 points 10 hours ago
[-] HubertManne@piefed.social 1 points 10 hours ago

which is fine but there is a trust chain or a big homework assignment for me to be comfortable with it.

[-] NachBarcelona@piefed.social -1 points 10 hours ago

My god you people 😂😂😂

[-] hansolo@lemmy.today 2 points 10 hours ago

Use a different VPN server and private mode on each. Easy.

[-] NachBarcelona@piefed.social 0 points 10 hours ago

You think people that tech illiterate have any idea how to use a VPN?

[-] yermaw@sh.itjust.works 1 points 9 hours ago

I know how to use one. Ive got no idea how to verify that its trustworthy.

[-] hansolo@lemmy.today 1 points 10 hours ago

Sadly, I know they usually don't.

[-] NachBarcelona@piefed.social -2 points 10 hours ago* (last edited 10 hours ago)

Holy tech illiteracy batman

[-] THE_GR8_MIKE@lemmy.world 1 points 9 hours ago

Thanks for the explanation. Really makes me want to do it even more.

[-] NachBarcelona@piefed.social -1 points 7 hours ago

That rocks my world.

[-] The_Picard_Maneuver@piefed.world 20 points 11 hours ago

PicardIsSexy - 0 times (!The_Picard_Maneuver@piefed.world you're safe. ;)

That was a close one!

[-] hansolo@lemmy.today 13 points 10 hours ago* (last edited 10 hours ago)

For anyone reasonably concerned about the obvious boneheaded move of checking your email and then entering your password, here's some options:

  • Don't check them at the same time or on the same device. Use wifi and a laptop to check your email. 20 minutes later on your phone and 5G, check your password. Two different IP addresses and browser fingerprints.

  • Use Tor

  • Change VPN locations and browsers on the same device.

  • Don't just check your password and close the page. Check 10 made up BS passwords and throw yours in the middle.

This is all on top of the fact that HaveIBeenPwned has been a beacon of sanity for more then a decade. Troy Hunt remains huge in the cybersecurity research space, and diligently combs over data leaks. This site was one of Gizmodo's 100 sites that shaped the internet in 2018, and remains the most accessible database of leaked credentials there is, without actually giving away the credentials.

Now go check yourself before someone else wrecks yourself.

[-] LordKitsuna@lemmy.world 2 points 7 hours ago

This functionality is built-in to bitwarden, they can safely check your entire vault for known breaches

[-] northernlights@lemmy.today 4 points 10 hours ago

TIL that besides offering a password compromise checking service, they also offer a compromised email checking service!

[-] Nioxic@lemmy.dbzer0.com 2 points 10 hours ago

I dont think its a good idea to give them your password

this post was submitted on 05 Feb 2026
136 points (99.3% liked)

Today I Learned

27818 readers
1015 users here now

What did you learn today? Share it with us!

We learn something new every day. This is a community dedicated to informing each other and helping to spread knowledge.

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must begin with TIL. Linking to a source of info is optional, but highly recommended as it helps to spark discussion.

** Posts must be about an actual fact that you have learned, but it doesn't matter if you learned it today. See Rule 6 for all exceptions.**



Rule 2- Your post subject cannot be illegal or NSFW material.

Your post subject cannot be illegal or NSFW material. You will be warned first, banned second.



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Posts and comments which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding non-TIL posts.

Provided it is about the community itself, you may post non-TIL posts using the [META] tag on your post title.



Rule 7- You can't harass or disturb other members.

If you vocally harass or discriminate against any individual member, you will be removed.

Likewise, if you are a member, sympathiser or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people, and you were provably vocal about your hate, then you will be banned on sight.

For further explanation, clarification and feedback about this rule, you may follow this link.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- Majority of bots aren't allowed to participate here.

Unless included in our Whitelist for Bots, your bot will not be allowed to participate in this community. To have your bot whitelisted, please contact the moderators for a short review.



Partnered Communities

You can view our partnered communities list by following this link. To partner with our community and be included, you are free to message the moderators or comment on a pinned post.

Community Moderation

For inquiry on becoming a moderator of this community, you may comment on the pinned post of the time, or simply shoot a message to the current moderators.

founded 2 years ago
MODERATORS