Password reuse is rampant: nearly half of observed user logins are compromised
https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/
#CyberSecurity
You must log in or register to comment.
@[email protected] How would Cloudflare know this, unless they are intercepting and LOOKING AT credentials and otherwise HTTPS-encrypted traffic?
I’m no fan of Cloudflare, but did you read the article?
As part of our Application Security offering, we offer a free feature that checks if a password has been leaked in a known data breach of another service or application on the Internet. When we perform these checks, Cloudflare does not access or store plaintext end user passwords.
They then go on to say they hash them and compare the hash to a db.
It’s an interesting read