meta_pixel
Tapesearch Logo
Log in
Darknet Diaries

Ep 33: RockYou

Darknet Diaries

Jack Rhysider

True Crime, Technology

4.98.6K Ratings

🗓️ 5 March 2019

⏱️ 43 minutes

🧾️ Download transcript

Summary

In 2009 a hacker broke into a website with millions of users and downloaded the entire user database. What that hacker did with the data has changed the way we view account security even today. This episode was sponsored by CuriosityStream. A streaming service showing non-fiction and documtnaries. Visit https://curiositystream.com/darknet and use promo code "darknet". This episode was sponsored by CMD. Securing Linux systems is hard, let CMD help you with that. Visit https://cmd.com/dark to get a free demo. To see more show notes visit darknetdiaries.com/episode/33. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

So let's start out with the tell us your name and what do you do?

0:02.9

So my name is Troy Hunt. I am an Australian security researcher, I guess.

0:08.5

That's term seems to be used a lot. I run the data breach notification service, have I been

0:13.6

powned? I write some online training for people and speak at events.

0:16.9

Troy's website, have I been poem.com is amazing. Basically, if there's a data breach out there,

0:21.9

where the data is public, Troy knows about it. He collects all the breach data and puts it into

0:26.7

his database and lets people search for their email address to see if their account has been

0:30.9

in a breach. Yeah, so I mean a typical example, let someone pop up and says, look, I've got

0:35.1

data. It's often via an email or a Twitter DM and they say, look, would you like it if I have

0:40.3

I've been powned? They often send me a link to mega. So they'll put it on mega in Z somewhere.

0:46.0

Sometimes they ask for attribution as well. So some people want either the notoriety or the

0:50.5

or the fame as it may be. I go through, grab that data, validate that it's actually legitimate

0:56.4

then load it in, write it up and publish it. He's been running this site since 2013, adding all

1:03.0

the public and semi-public user account data breach details that he could find. And his site has

1:07.7

truly changed how we view our account security. Yeah, just really began. I mean, I guess one of the

1:13.1

things that amazes me, I'm looking at the record count now having just loaded the Dub Smash data

1:18.3

last night and it's almost 6.9 billion records. And I remember when I started and there was like

1:25.0

155 million records in there and I was like, well, this is a lot of data. I wonder if it's going

1:31.2

to be able to get much bigger. That is, there have been 6.9 billion email addresses seen in

1:36.2

data breaches in the last 10 years or so. That's a lot of email addresses. So this is 6.9 billion

1:43.2

breached accounts. So as an example, my own email address has been seen 15 times. So of that 6.9

1:50.9

billion, 15 of them are me. So this is not unique email addresses. Unique email addresses is more

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Jack Rhysider, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Jack Rhysider and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.