Share this.

  • JackFrostNCola@lemmy.world
    link
    fedilink
    English
    arrow-up
    0
    ·
    1 month ago

    With a quick google, what are the chances that erm71 is code for “Elon Reeve Musk 1971”.
    There no way that a tech savvy individual would do something as simple as use his name and DOB for usernames and email addresses… Whats his password “teslarulez1971!”?

    • Dashi@lemmy.world
      link
      fedilink
      arrow-up
      0
      ·
      1 month ago

      I’m sure that is exactly what it means. The point was to hide it a little bit, it’s not the standard first.last of everyone else but to make it still uniquely identifiable as musk. It’s not a completely unheard of practice to hide potential high spam targets. The goal isn’t to completely hide, just make it slightly harder to find

      • brygphilomena@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        0
        ·
        1 month ago

        This is why scraping LinkedIn works so well. Using the consistent email format gets you to your target easily. I’ve used it to get the contact info of the CTO of American Airlines before (his auto-reply included his cell number.)

        • Dashi@lemmy.world
          link
          fedilink
          arrow-up
          0
          ·
          1 month ago

          No it does not. Neither does having a password as they can be leaked or cracked or who knows what. Turning off tcmp echo on your router won’t stop all bad actors but it will stop some. All security practices are just small steps to make it slightly harder for bad actors.

          • pivot_root@lemmy.world
            link
            fedilink
            arrow-up
            0
            ·
            edit-2
            1 month ago

            There is no such thing as perfect security, but there’s a big difference between trying to obscure something confidential between two parties (a password) and trying to obscure information that by design must be shared with other parties (an email address).

            Outside of diligently using disposable alias addresses, obscuring an email is an exercise in futility. The biggest point of failure in security is the human, and all it takes is a single person to leak it. With all the people that need to communicate with Musk over email, the opportunity for that to happen is far higher than the chance of something like someone successfully cracking a hash.

    • CoffeeJunkie@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      0
      ·
      1 month ago

      And why not? You forget there is beauty in brevity.

      A breach is a breach is a breach is a breach. You’d be criticizing his choice whether it was 5 simple characters or 500. When you K.I.S.S. it makes it easier to remember AND quicker to enter, access. I had to choose a password for work once, and I made it a little complex…work constantly logged me out 🙄🙄🙄🙄🙄…I had to enter that stupid fucking password so many fucking times, yes, it was secure. It was also DUMB and FRUSTRATING. Next 3 passwords were far simpler to repeatedly type in; I learned my lesson.

      Same with Apple always auto-generating stupid passwords, I hope you never have to type them in! It’s just dumb, as illustrated by XKCD.

      XKCD also has a suggestion for strong, memorable, easy passwords.

      Be smart. Make life simple. Don’t do stupid things. 🫡