meta_pixel
Tapesearch Logo
Log in
Malicious Life

Troy Hunt - Interview

Malicious Life

Malicious Life

Technology

4.81K Ratings

🗓️ 4 August 2020

⏱️ 21 minutes

🧾️ Download transcript

Summary

Troy Hunt - Interview



Advertising Inquiries: https://redcircle.com/brands

Transcript

Click on a timestamp to play from that location

0:00.0

Troy could you start off by introducing yourself?

0:02.8

My name is Troy Hunt. I started the website Have I Been Poned and I normally do a lot of traveling and speaking, just not at the moment.

0:11.2

For those who don't know what is have I been poned and what was the impetus for creating it?

0:16.9

So have I been pained as a data breach aggregation service when there's a data breach and that data

0:21.7

then gets leaked somewhere externally at varying

0:24.7

degrees of public accessibility. I grab it, I put it in a have I been poned and I make it

0:29.8

searchable so people can figure out where they have been poned and I started it in December 2013 and

0:37.0

somehow it became big and popular.

0:39.2

Before we get into the weeds of everything you do though though much of our episode is going to

0:43.8

concern the history of passwords so from what you know I've read some of your blogs

0:48.6

on the matter can you give us a minor history so how were passwords dealt with back in the day?

0:54.4

And how have they changed as computers and threat actors have evolved?

0:59.0

So passwords on computer systems go back to around about the 60s so we believe the first

1:04.3

instance of a password outside of just normal usage I mean we would have had

1:09.0

passwords thousands of years ago but passwords on computer systems go back to MIT in the 60s and they had

1:15.3

this compatible time sharing system where you had multiple people that could use the

1:19.4

same physical infrastructure of course it was very big infrastructure back then and the

1:24.3

password was the way of ensuring that whoever was using it was identified and they weren't

1:29.2

able to use a system on

1:33.2

on behalf for someone else. So many of the things that we we started setting in place

1:35.2

around how we authenticate to a computer system began now to what are we at

1:41.1

60 years ago. And how early on did hackers figure out that they could take advantage of passwords?

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.