- Joined
- Mar 16, 2001
- Messages
- 10,074
For those who don't know, CloudFlare, the company that provides backup / DDoS protection for thousands of sites, including Smashboards was found to have an exploit which leaked passwords and credentials.
It's unknown of smashboards was specifically affected as far as I know, but you might want to change your password to be safe.
More info on the leak here:
http://www.popularmechanics.com/technology/security/a25380/cloudbleed-explained/
And a some resources you can use to check if other sites you use were affected:
https://github.com/pirate/sites-using-cloudflare/wiki/List-Search-Tools
Notable Sites affected (though the total list is much longer)
It's unknown of smashboards was specifically affected as far as I know, but you might want to change your password to be safe.
More info on the leak here:
http://www.popularmechanics.com/technology/security/a25380/cloudbleed-explained/
And a some resources you can use to check if other sites you use were affected:
https://github.com/pirate/sites-using-cloudflare/wiki/List-Search-Tools
Notable Sites affected (though the total list is much longer)
- authy.com
- coinbase.com
- bitcoin.de
- betterment.com
- transferwise.com
- prosper.com
- patreon.com
- bitpay.com
- news.ycombinator.com
- producthunt.com
- medium.com
- 4chan.org
- yelp.com
- okcupid.com
- zendesk.com (Zendesk post and updates | no leaked data found)
- uber.com
- poloniex.com
- localbitcoins.com
- kraken.com
- 23andme.com
- curse.com (and some other Curse sites like minecraftforum.net)
- counsyl.com
- tfl.gov.uk
- myaccount.nytimes.com
- technicpack.net
- cloudflare.com
- blockchain.info
- discordapp.com (affected)
- digitalocean.com (no leaked data found in several search engine caches)
- namecheap.com (no leaked data found in several search engine caches)
- glassdoor.com (no leaked data found in several search engine caches)
- vultr.com (no leaked data found in several search engine caches)
- fastmail.com (not affected, #2)
- 1password.com (not affected)
Last edited: