SoundCloud Data Breach Now on HaveIBeenPwned

Posted by gnabgib 2 days ago

Counter205Comment109OpenOriginal

Comments

Comment by al_borland 1 day ago

I went through and deleted a bunch of accounts a while ago, SoundCloud being one of them. It looks like I don't show up in the breach. It's nice to know SoundCloud actually deleted my data, I'm never totally sure what happens on the backend.

Comment by parable 1 day ago

They still seem to use past email addresses for marketing communications, despite the email address on file having been changed months ago. They definitely still keep old data around and fail to sync data between vendors. Whether that's indicative of their data deletion policies remains to be seen, but to me the lack of care for using past data for active accounts doesn't paint them in a very good light.

Comment by gnabgib 1 day ago

Only 20% of accounts were breached, so that's an optimistic conclusion.

Comment by eXpl0it3r 1 day ago

I still have two active accounts and neither of those were in the breach of the 20% of accounts.

Comment by gleenn 1 day ago

In theory, it's a legal requirement based on GDPR and CCPA as well as many other new digital rights laws across Europe and many states in the USA. SoundCloud is probably big enough to do that correctly otherwise e.g. the GDPR penalty is a highish percentage of the company's total revenue which gives the laws a good amount of "teeth".

Comment by Nextgrid 22 hours ago

> the GDPR penalty is a highish percentage of the company's total revenue which gives the laws a good amount of "teeth"

Under 2% of GDPR complaints even result in fines. And that would require there to be grounds for a complaint - there's no way for an external user to tell whether the delete is actually done, and the DPA won't force them to submit to a third-party source code audit.

The GDPR has zero teeth. But don't take it from me, these guys have a bit more expertise than I do on this subject: https://noyb.eu/en/data-protection-day-5-misconceptions-abou...

Comment by Razengan 1 day ago

For some services, like Anthropic/Claude's stubborn refusal to let you remove your payment method, deleting isn't even an option.

Comment by al_borland 1 day ago

I ran into this with Sony. The website said to call, so I did. After 45 minutes on hold the guy just hung up on me saying he couldn’t help, without even really listening to me.

For a company that’s been hacked as many times as Sony, I find this to be pretty pathetic.

Comment by g947o 1 day ago

I'm not surprised.

Different company, same story.

Comment by 1 day ago

Comment by thinker1972 1 day ago

People should be using email alias. 1 unique alias per 1 uniques service and websites for proper segregation. If any of the unique alias leaked or getting spammed you'd know where the source is and blocking that specific alias would limit the breach. Theres simplelogin.io, addy.io, firefox relay, apple hide-my-email, custom domain catchall etc for that.

Comment by karlgkk 1 day ago

IMO use email providers that have that built in. Because if your alias provider goes down, you’re fucked. And considering it’s a much less stable business than an email provider, it’s more likely.

If Gmail goes down in 20 years, it will be a major occurrence. If mailgoforward.fart goes down, you’re screwed.

The advice is, as always, use a second mail address for “sensitive” providers. Use a password manager and two factor for everything. Ideally one that integrates into your phone and browser.

For traceability, most providers support a + alias syntax now. Ie foobar+baxservice@provider.com

Comment by perching_aix 1 day ago

I don't get why + addresses always come up in this. They're machine-undoable by design.

Using randomized relay addresses instead gives you an immensely higher confidence that when a given contact address starts getting spam, it is misuse stemming from a specific entity. Especially if you rotate it at a fixed time interval, cause then you can even establish a starting timeframe.

Still not perfect but it can never really be, and not even out of email's fault. As long as DNS and IP addressing rule the world, there's only so much one can do. Once identity is private-default, it becomes a secret handling problem at its core, a capability these schemes were never designed to provide.

Comment by thinker1972 1 day ago

I'd say for longevity and portability use own custom domain. Simplelogin, addy support using own custom domain. Its just $10-15 something per year. Most tld allowed max cumulative renewal up to 10 years so $100-150. Setup a yearly calendar reminder on January to renew +1 year so at any give time the domain will have minimum 9-10 years before expiring. If got hit by a bus tomorrow then 9 years should be long enough time for whatever accounts linked to the domain to rot and be useless for the next domain owner.

Comment by charliebwrites 1 day ago

> If Gmail goes down in 20 years, it will be a major occurrence. If mailgoforward.fart goes down, you’re screwed.

The technical equivalent of “if you default on a $100,000 loan you have a problem. If you default on a billion dollar loan the _bank_ has a problem.

Comment by theandrewbailey 1 day ago

I have my own domain, so I canary trap the email addresses I give out.

https://en.wikipedia.org/wiki/Canary_trap

Comment by varispeed 1 day ago

Many websites block such providers because of spam.

Comment by djee 1 day ago

"The data involved consisted only of email addresses and information already visible on public SoundCloud profiles".

So they've scraped public data. Why care?

Comment by richrichardsson 1 day ago

> email addresses

Aren't on public SoundCloud profiles.

Comment by gnabgib 1 day ago

Hackers stole information of 29.8M accounts (~20% of users). SoundCloud is downplaying the data beyond email address as "publicly available", but the data wasn't scraped. "Profile statistics" aren't public either. Their main response[0], seems to focus on passwords and payment details being the only risky data. They even imply email addresses are public.

> no sensitive data was taken in the incident.The data involved consisted only of email addresses and information already visible on public SoundCloud profiles (not financial or password data)

[0]: https://soundcloud.com/playbook-articles/protecting-our-user...

Comment by idiotsecant 1 day ago

If the email addresses were visible on public profile pages in what sense are they not public?

Comment by hamdingers 1 day ago

Email addresses are not visible on public soundcloud profiles. You can test this yourself.

I read the statement to be "emails plus public information"

Comment by forgotaccount3 1 day ago

Maybe the two public data points weren't connected before?

I don't use SoundCloud, but if profiles didn't have contact information like Email Address on them then it could be meaningful to now connect those two dots.

Like, 'Hey look, Person A, who is known to use email address X, kept Lost Prophets as one of their liked artists even after 2013!'

Comment by neom 1 day ago

Yeah or this: https://news.ycombinator.com/item?id=26386418

SoundCloud is a weird place, people in entertainment have certain strong incentives. They figured out who I am, figured out all the email addresses I have, jacked the account attached to my SoundCloud, stole my account. I still to this day, don't know how they pwned my email (tfa was on but it didn't trigger suspicious activity it let them login without triggering it, no clue how they got the password either and the password is secure enough that it's too hard to brute force, and it's not in a pwned db). Based on what was in my soundcloud inbox when I got access again, someone paid a fair amount to have this done... and now I have to go change my email again I suppose.

Comment by direwolf20 1 day ago

Organized crime stealing usernames was apparently a thing for a few years back there, interesting it wasn't limited to Twitter.

Comment by cj 1 day ago

But, why care? (Yes, we can “care” that there was a leak - but… why worry? what new risk exists today that didn’t yesterday?)

The data in the leak (other than follower count, etc) was already available for purchase from Zoominfo, 8sense, or a variety of other data brokers or other legal marketplaces for PII.

I suppose the risk now is that the data is freely available and no longer behind a data broker’s paywall?

Comment by refulgentis 1 day ago

I'm confused, where were scrapers/data brokers/Zoominfo etc. were getting email addresses for SoundCloud accounts?

Comment by cj 1 day ago

They don’t. I’m confused why that info is valuable.

Comment by saaaaaam 1 day ago

People pitching scammy “I can make you famous” services to aspiring musicians. Happens all the time, there’s a whole industry dedicated to it.

Comment by refulgentis 1 day ago

Let's say you have a $SOCIETAL_TABOO streak and let it out via a soundcloud account that isn't identifiable as you without your email.

Now it is.

Now I can blackmail you or haunt you.

(I'm sure there's other examples, tl;dr people are deanonymized, there are uncountable reasons why people choose anonymity)

> The data in the leak (other than follower count, etc) was already available for purchase from Zoominfo, 8sense, or a variety of other data brokers or other legal marketplaces for PII.

?

Comment by direwolf20 1 day ago

Isn't that a huge GDPR violation?

Comment by refulgentis 1 day ago

You are 100% correct based on article. Not good that you're gray, and your parent of "who cares it was already available and scraped" is the top comment.

Comment by Alifatisk 2 days ago

> the impacted data included 30M unique email addresses, names, usernames, avatars, follower and following counts and, in some cases, the user’s country

Comment by embedding-shape 1 day ago

Importantly, 20% of the total userbase it seems:

> In December 2025, SoundCloud announced it had discovered unauthorised activity on its platform. The incident allowed an attacker to map publicly available SoundCloud profile data to email addresses for approximately 20% of its users. The impacted data included 30M unique email addresses, names, usernames, avatars, follower and following counts and, in some cases, the user’s country.

That's from the haveibeenpwned email which I received because of course I'm part of that 20%.

Remember to have unique passwords for each website kids, ideally with a password manager.

Comment by technion 1 day ago

Whilst thats important advice, as far as I can tell it wouldnt help here as no passwords are breached. I had a few of our domain users on this report and as far as I can tell theres nothing actionable.

Comment by pluralmonad 1 day ago

Also, never give out a direct email address, always an alias.

Comment by fragmede 1 day ago

and include a nonce. user+SoundCloud@gmail.com is obviously guessable. user+SoundCloudheuerue64@gmail.com ain't getting guessed.

Comment by pluralmonad 17 hours ago

I mean aliases provided by some service providers. Never been of fan of the + style pretend aliasing. Takes very little sophistication to extract the real email. A real forwarding alias does not expose the true email.

Comment by LoganDark 1 day ago

Gmail plus addressing is like the most widely known thing ever and also like the first thing checked by every scammer and hacker. It's so useless I've been using it for practically ever and spam related to brand new data breaches still has it stripped out. There have only ever been like two occasions where a spam email in my inbox didn't strip out the plus address.

Use something like Firefox Relay where it's impossible to strip out anything.

Comment by loganc2342 1 day ago

If I’m understanding correctly, it sounds like, aside from the email addresses, all the data leaked was already publicly available on users’ SoundCloud profiles. The only novel aspect is linking that public data to the accounts’ email addresses.

Comment by jacquesm 1 day ago

That step makes a big difference though.

Comment by direwolf20 1 day ago

An email–only breach seems to cheapen the value of HIBP. It's not telling me if my password was leaked.

Comment by poglet 1 day ago

Plus, the "Recommended Actions" only show me two sponsored products (1Password and Truyu) leaving me confused in what I'm supposed to do now.

Comment by direwolf20 1 day ago

It's just advertising slop like any other now. No different from "your computer has a virus, buy our cleaner app"

Comment by throwaway431234 2 days ago

SoundCloud is the worst company, so hostile to former paying users! I am a hobbyist songwriter and have posted my rough mixes (Apple's Music Memo app which adds drum and bass automagically with two clicks & then mix it in Garage Band) on my SoundCloud for more then ten years. I signed up for their Artist Pro account and was a member for of such consistently for a few years at $17 a month. Once you cancel they then hold all your music hostage by hiding it and later threat to delete it. Horrid!

Comment by direwolf20 1 day ago

A former paying user is not a customer. If you don't pay, why should you receive service? I buy a pizza at this pizza shop every week, but I still don't get free ones.

SoundCloud is European, so most of the dark patterns used by American companies to offer "free" service are not available to them, and they are required by law to actually delete data instead of pretending to delete it.

Comment by Scoundreller 1 day ago

> I buy a pizza at this pizza shop every week, but I still don't get free ones.

Do they take the leftovers from your fridge when you stop buying?

Comment by internetter 1 day ago

The analogy was bad. You're effectively renting space in their fridge. In that case, absolutely.

Comment by direwolf20 1 day ago

If I haven't bought pizza for two months, they use their magical ray, reach into my fridge and turn the leftovers into mold.

Comment by hombre_fatal 1 day ago

The difference between Artist vs Pro is three hours vs unlimited uploaded music.

So if you had over three hours uploaded, it seems reasonable for them to restrict the service. If you had <= three, then it would a problem.

Comment by goblin89 1 day ago

SoundCloud used to be good prior to the redesign.

Recently I decided to evaluate it for serious use and start posting there again, only until their new uploader told me I need to switch to a paid plan, even though I triple-checked I was well within free limits and under my old now unused username I uploaded a lot more (mostly of experimental things I am not that proud of anymore).

It looks like their microservices architecture is in chaos and some system overrides the limits outlined in the docs with stricter ones. How can I be sure they respect the new limits once I do pay, instead of upselling me the next plan in line?

Adding to that things like the general jankiness or the never-ending spam from “get more fake listeners for $$$” accounts (which seem to be in an obvious symbiosis with the platform, boosting the numbers for optics), the last year’s ambiguous change in ToS allowing them to train ML systems on your work, it was enough for me to drop it. Thankfully, it was a trial run and I did not publish any pending releases.

If you still publish on SoundCloud, and you do original music (as opposed to publishing, say, DJ sets, where dealing with IP is problematic), ask yourself whether it is timr to grow up and do proper publishing!

Comment by storystarling 1 day ago

This sounds like a classic consistency vs latency trade-off. Enforcing strict quotas across distributed services usually requires coordination that kills performance. They likely rely on asynchronous counters that drift, meaning the frontend check passes but the backend reconciliation fails later. It is surprisingly hard to solve this without making the uploader feel sluggish.

Comment by LoganDark 1 day ago

That would explain why the front-end would allow you to attempt something that goes over your limits, but not why the back-end would reject something that doesn't go over your limits.

Comment by storystarling 1 day ago

Fair point. I suspect it comes down to ghost reservations or stale caches. If a previous upload failed mid-flight but didn't roll back the quota reservation immediately, the backend thinks you're over the limit until a TTL expires. Or you delete something to free up space, but the decrement hasn't propagated to the replica checking your quota yet.

Comment by goblin89 1 day ago

My bet at the time was that they have a bunch of hidden extra limits based on account age, IP/user agent information, etc. If that is true, their problem is that they advertise the larger limits instead of the smaller limits (to get more users signed up), and that they do not communicate when their extra limits apply and instead straight up upsell you, which are both dark patterns.

Comment by storystarling 1 day ago

That sounds plausible. I've had to implement similar reputation-based limits on my own backend just to keep inference costs from exploding, so I sympathize with the fraud prevention angle. Masking that as a generic quota issue to push an upsell is pretty hostile though.

Comment by goblin89 1 day ago

The feeling of being gaslit, when I calculated and recalculated the length of my tracks and compared it with limits on their pricing page, was quite unpleasant.

Another possibility is maybe they reduced their limits from 3 to 2 hours of audio around the same time. I don’t know if it happened before or after my experience, did not read their blogs or press releases, only made sure I was well under whatever limits were currently listed on their pricing & plans page (I was probably under 2 hours as well, but as this point can’t be bothered to check). Perhaps that transition was chaotic and for some time their left hand did not know what the right hand is doing.

Comment by storystarling 1 day ago

Fair point. I suspect it comes down to how they handle retries. If an upload times out but the counter already incremented, the system sees the space as used until an async cleanup job runs. It is really common to have ghost usage in eventually consistent systems.

Comment by goblin89 1 day ago

That’s a possibility.

Comment by crazybonkersai 1 day ago

You can export your entire profile using yt-dlp. Of course you have to do it, when you are still a paying customer.

Comment by thenthenthen 1 day ago

Do this regularly, like youtube soundclownd ‘silent’ deletes favorites and also blocks songs based on your vpn/geo location. I lost so much music… so i need to resort to scraping. Simple solution: make the song unavailable but please just keep the entry (name-title) in your fav. list.

Comment by dylan604 1 day ago

Why would someone that writes their own songs, mixes in GarageBand, uploads to a 3rd party website need to use yt-dlp to get back the files that they themselves made?

Yes, I'm intentionally victim blaming here. The victim is complaining about a 3rd party site deleting files. Who cares? Why would you have as your only source of your files the copies stored by the 3rd party?

Comment by crazybonkersai 1 day ago

You get a point there, but export is mostly about metadata, eg images and description.

Data loss happens too. Soundcloud may be your only source of your own tracks.

Comment by throwaway431234 1 day ago

Date of publication (copyright) is important to a songwriter. Soundcloud im sure knows this! Probably should have said this from the top!

Comment by direwolf20 1 day ago

Not only that, the victim is complaining about a paid file storage company deleting the files when the victim stops paying

Comment by PunchyHamster 1 day ago

that just sounds like customer not paying for service not getting the service

Comment by bestham 1 day ago

The service is freemium, so they had a limited account. Decided to pay for a premium account. And apparently can’t downgrade and get back what they once had.

Comment by input_sh 1 day ago

I'm just guessing, but this:

> and have posted my rough mixes [...] on my SoundCloud for more then ten years

...easily implies >3h of uploads, which is over the free plan limit. If you're over that limit and stop paying, yes, it makes perfect sense that they'd threaten with deletion of some of your existing uploads.

Comment by throwaway431234 1 day ago

They first hide your songs and as time goes on they start threaten to delete your songs if you dont pay

Comment by colordrops 1 day ago

What should they do instead? spend money continuously holding your music on disk forever even though you aren't paying them for the service? Sounds like they are being cool about it by keeping it around for a while and warning you before deleting it.

Comment by goblin89 1 day ago

The marketing move of offering an unlimited plan reveals that storage and traffic are not that expensive and someone made a choice that light users will subsidize heavy users. With that, hiding your data from you and subsequently deleting it, at least without first encouraging you to download it within some post-downgrade grace period, would be a choice, not necessity, and is user-hostile.

If it is an actual necessity—a service chose to market an unlimited plan to attract more users, and then realized they are losing money on storage and traffic so much that they would unapologetically burn bridges with existing users who showed themselves as willing to pay (who maybe needed to downgrade temporarily for whatever reason) with the above move—and yet their strategy is apparently to keep offering that plan (in hopes to turn things around with more light users joining?), I would question whether that service has serious issues with even medium term planning.

Comment by direwolf20 1 day ago

No matter their actual costs to provide the service, I'm struggling to see why they should not immediately delete all of your stored files upon cancellation of the storage service.

They are a European company, so you are the customer, not the product and recipient of subsidies. They use less manipulation and dark patterns than an equivalent American company.

You pay, you get service. You don't pay, you don't get service. If they can't bill you, they should try to communicate with you for a few months before treating it as a cancellation. If you cancel, then your choice is clear and you should expect your service to be immediately terminated at the end of the current billing period. If their service is storing files for you, termination of the service means deletion of the files.

There is no need for a grace period when you knowingly and voluntarily make the decision to terminate a file storage service.

Comment by goblin89 1 day ago

> you are the customer, not the product and recipient of subsidies

They also do advertisement (promoted tracks and audio ads) but this is irrelevant to my point, what I described applies regardless, including the fact that heavy users of the unlimited plan and free users definitely receive subsidies, both from light users and from ad revenue of the platform.

> You pay, you get service. You don't pay, you don't get service

The definition of the service you receive and how good it is includes what happens when you decide to off-ramp from receiving it. Changing your service plan is your indication that you want to change service, what happens after that is how they handle it. There is no stipulation whatsoever that things stop being available to you immediately.

In fact, in case of SoundCloud, they themselves prove this, because they did not delete data but instead continued to keep data for free, which means providing you a service that you presumably stopped paying for. The silly move of them was to do that and not allow you to download it, and then emailing the victim urging them to pay to access this data, which makes it 100% a dark pattern and means they are effectively blackmailing customers with proven ability and willingness to pay.

If I remember right, Apple (an American company) handles it better and gives you a month to download excess data if you downgrade, but sure, “dark patterns”.

> There is no need for a grace period when you knowingly and voluntarily make the decision to terminate a file storage service.

If you terminate your use of a file storage service, you would expect your personal data to be deleted. However, no one terminated their use of a service, somebody apparently downgraded their payment plan (temporarily or not).

Comment by direwolf20 4 hours ago

Sounds like they will warn you about your storage limit for a while, so you can choose which data to delete to be under the limit, before deleting your data at random to force you under the limit. Quite reasonable.

Comment by goblin89 3 hours ago

You mean Apple? I don’t think they actually delete any minor excess data that may occur incidentally due to race condition or eventual consistency. Just if you actually downgrade, they do… After a month or so, during which you can still download.

Comment by throwaway431234 1 day ago

Overall what Im saying is they treat their non-paying customers better then their paying ones. Once I was a paying customer after having and using my free account for over 7 years then converting to a paying customer and having to cancel Soundcloud became hostile.

Comment by direwolf20 1 day ago

Did you have more stored data than the limit for stored data for unpaid accounts?

Comment by dzhiurgis 1 day ago

As a listener I'd pay (a reasonable amount like <$5 per month) to only listen to mixes, especially if it can be filtered by bitrate.

Their best feature is social feed - I only see reposts from people I follow. But for branching out / discovery might be cool to see what their feed looks like, so something like "show followees feed".

Comment by dzhiurgis 1 day ago

I'd pay for Soundcloud, but not sure what I'd get for over free version. It costs more than Apple Music and offering offline nowadays is lol feature.

Comment by jacquesm 1 day ago

You mean you never kept your originals but just uploaded and deleted the masters?

Comment by throwaway431234 1 day ago

Date of publication (copyright) is important to a songwriter even if there are a hobbyist.

Comment by jacquesm 21 hours ago

That was a solved problem before the days of the internet.

Comment by gmueckl 1 day ago

Are there any alternatives?

Comment by tern 1 day ago

A lot of people use apps like this lately: https://untitled.stream/, https://gatefolded.com/, https://samply.app/

Comment by dewey 1 day ago

Isn't everyone on YouTube or Bandcamp now for this use case?

Comment by alexalx666 1 day ago

YouTube is the domain of Satan, also the name is hilarious - you tube? really? I don't tube thaanks

Comment by TechSquidTV 1 day ago

A lot of "rap gods" are about to be exposed as "Kevin" from suburbia.

Comment by ddtaylor 1 day ago

Thankfully the only artist I listen to on there has been known as Bryce from the suberbs for two decades:

https://soundcloud.com/ytcracker

Comment by giancarlostoro 1 day ago

Lil B is probably fine, but he is the biggest name I recall coming out of SoundCloud. He blew up all over the 2010s, he was the Kanye of Cloudrap too because he took dressing styles and changed it all up similar to Kanye.

Comment by sam1r 1 day ago

Shout out to lil b and those parties at Berkeley he would perform at in ‘12, ‘13.

Those were the golden sound cloud years.

Comment by giancarlostoro 1 day ago

I was big on tumblr, but he wasn't my style of rap, but I respect him for what he was able to pull off.

Comment by gnabgib 1 day ago

There's a few big names: Post Malone, Billie Eilish, Lil Nas X, Khalid, Bad Bunny

Comment by EGreg 1 day ago

This Kevin was still quite impressive

https://en.wikipedia.org/wiki/Kevin_Mitnick

Comment by fencepost 1 day ago

So I guess I should watch out for scams being sent to "soundcloud@" on a personal domain. Oh no, how will I distinguish them from my legitimate banking email???

Comment by alexfoo 1 day ago

Clever spammers (there are some!) see the presence of company@<domain> and assume the user will have similar emails for other accounts, so it might be worth trying ebays scams to ebay@<domain> or banking scams to chase@<domain> or boa@<domain>. Sending is cheap so why not, you're not trying to fool everyone, only a few.

I use a unique string per company but it's not guessable in advance, but it's obvious when looking at it and squinting a bit, for example (and these are not the exact ones I use): sundclod@<domain> or ebuy@<domain> or amzoon@<domain>

Sure I have to remember them but it's easy for me to check and my password manager is filling them in for me 99.99% of the time.

I can filter on those emails instead, and I also know that anything coming to soundcloud@<domain> or ebay@<domain> or amazon@<domain> is definitely spam as I've never used those addresses myself.

If sundclod@<domain> appears in a leak I can (hopefully) change my account email at Soundcloud to sondclud@<domain> and then confine sundclod@<domain> to /dev/null

Comment by fencepost 20 hours ago

I have three different generations of email addresses associated with United Airlines that all receive spam. Never any disclosed breaches AFAIK, but clearly email addresses got out at several points. At some point I stopped bothering to check.

As for Soundcloud, the password I had saved for it and a tiny bit of profile information tells me a lot - a manually created password saved into a password manager, probably in 2010 or 2011 and unused after grabbing a single track.

Addresses for services I actually care about also get what's basically peppering, and have all had updates much more recently than the days of Blackberry devices.

Comment by extraduder_ire 19 hours ago

Has this happened to you before?

I can't imagine anyone spamming in such low quantities that they'll notice a pattern like company@<domain> and act on it.

I have regularly gotten spam emails without a to, cc, or bcc field though. So I can't tell which email they were sent to. (my host doesn't bounce/drop them for some reason)

I do regularly do misspellings of the company name though, since that often trips the "invalid email" check on signup. e.g. twitter.

Comment by direwolf20 1 day ago

For the more shady sites, I use first names or fake usernames.

Comment by baby_souffle 1 day ago

We are the minority of users that had enough foresight to do this. I'd bet that _most_ people on this breach don't even know about the plus/dot trick with gmail (and I am sure other providers, too).

Comment by CaptainWeekend 1 day ago

Oh nice. Maybe I can finally recover (and finally shut down) my old account I accidentally locked myself out of.

Comment by refulgentis 1 day ago

Kinda sad to see a "Recommended Actions", with only sponsors, with ad copy that would be understood by HN readers but not our non-technical friends. (i.e. a simple "Nothing. No passwords have been leaked yet, only metadata" in this case)

Comment by snorbleck 1 day ago

making mountains out of mole hills. this type of panic is really common in the infosec world.

Comment by doodlesdev 1 day ago

How so? I tend to disagree with the general statement that this is common in the infosec world, but I'd like to understand better what you mean by that.

Comment by vachina 1 day ago

Impact in this case, is non-existent (Wow they got my email)

> I'd like to understand better what you mean by that.

Recall there was a period where every CPU sidechannel attack had a dedicated (wow) website and a rock band name assigned to it (when in reality their impact again, was/is limited).

Comment by nalekberov 1 day ago

Glad that I removed my SoundCloud account right on time.

I think it’s only a matter of time before a service gets breached.

It's best to use unique random username, email, and password for every online account. Also, providing only the bare minimum of data and faking as much as possible is helpful in cases of data breaches.

Comment by paulpauper 1 day ago

all this leaked data pretty much used for one objective now: stealing crypto

Comment by WhereIsTheTruth 1 day ago

By aggregating breach data by email, this tool inadvertently exposes users's full web history, including sensitive sites like crypto/adult/dating platforms, to anyone who knows their address

Fun

Comment by rocky_raccoon 1 day ago

From the FAQ [1]:

What is a "sensitive breach"?

HIBP enables you to discover if your account was exposed in most of the data breaches by directly searching the system. However, certain breaches are particularly sensitive in that someone's presence in the breach may adversely impact them if others are able to find that they were a member of the site. These breaches are classed as "sensitive" and may not be publicly searched.

A sensitive data breach can only be searched by the verified owner of the email address being searched for. This is done by signing in to the dashboard which involves verifying you can receive an email to the entered address. Once signed in, all breaches (including sensitive ones) are visible in the "Breaches" section under "Personal".

There are presently 82 sensitive breaches in the system including Adult FriendFinder (2015), Adult FriendFinder (2016), Adult-FanFiction.Org, Ashley Madison, Beautiful People, Bestialitysextaboo, Brazzers, BudTrader, Carding Mafia (December 2021), Carding Mafia (March 2021), Catwatchful, CityJerks, Cocospy, Color Dating, CrimeAgency vBulletin Hacks, CTARS, CyberServe, Date Hot Brunettes, DC Health Link, Doxbin and 62 more.

[1] https://haveibeenpwned.com/FAQs#SensitiveBreach

Comment by WhereIsTheTruth 1 day ago

You don't get to gatekeep what counts as "sensitive", all of my privacy is non-negotiable

Comment by direwolf20 1 day ago

> Bestialitysextaboo

I laughed pretty hard

Comment by jeremyken708 1 day ago

[dead]