I don't get why Emily would want us to call the police. If she's so innocent then just hand your PC to the police without our involvement. Hopefully they never give it back to the pedo. Same with her other electronics.
Inside Emmy's server:
To verify that you are not a troll, all newcomers must send Emily a picture of their dick or pussy.
To get voice permissions, you must send Emily a video of you masturbating.
What does she do with all those files, anyway?
Inside Emmy's server:
To verify that you are not a troll, all newcomers must send Emily a picture of their dick or pussy.
To get voice permissions, you must send Emily a video of you masturbating.
What does she do with all those files, anyway?
Okay, hear me out, but she might be onto something (commonly retarded). I honest to God thought this englang shit was over like 20 years ago but I can see that's not the case.
@SamanthaPrater in case you're wondering:
There are no Bri*ish and Aus*ralian languages you absolute intellectually deficient hag from Nurgle' garden. There's only English. And your Amerikansky is the bastard child of English. As well as Aussie dialect, Kiwi one, Canuck one ( Anal land with a red leaf on it's flag), etc.
On an unrelated note a particular thought came up from another random conversation about Emily yet again, and following that thought experiment opened up a rabbit hole that led to something I was not quite expecting. To be completely serious for a moment, Emily, this is the part where you start being really nice to me so that I remain reluctant to openly share what I have discovered.
For today's Cat Talk, we're going to be talking about passwords. Special thanks to @Man In A Dress for their assistance in reigning in my autism.
Passwords 101 – a sequence of characters, numbers and sometimes symbols that tied with a username or email allow you access to an account somewhere. While there's nothing stopping you from reusing the same password it's very much a poor idea as if one service/account gets compromised, all of your accounts everywhere get compromised. With alarming regularity breaches and other security failures happen and big lists of usernames, emails, passwords along with other things we don't care about at this moment get added to massive databases that state “You've been pwned”.
What goes into a password? Well, it depends on where the account is and how they decided to set up their authentication system. Many websites require passwords that are minimum 8 characters in length and can use a variety of numbers, letters and symbols (in some cases, requiring at least two of the prior categories in addition to counting lowercase/uppercase letters as different categories) while others skimp a bit on complexity and only require 6 characters that can only be numbers and letters (looking at you DeviantArt).
Why am I bringing this up? Because the real subject is a look into the mind of a plagiarizing, bullying, art thief, drama whore and what logic they follow to make their passwords. For the following, names, passwords and hashes have been changed to protect the stupid (you know who you are).
Username/Email
Obscured password
SHA1 hash
Vivianazariahmamamia
Bratz************************
09a45a23abe97e5da2419fc43bc18c2e128f2b1a
Raven*********
823aeb07dc9b27cd0ce996f9bb7fca16604ae203
Raven****
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
Raven*******
b4431117a81897348480bea71c3f04c26de69043
Raven*****
b2d57d275ba170c5171e608763eae55cfe6e6dd2
WinxC******
5623f3b290e8baacc6f353a124f14d921f648140
Willowtheway
OxKyl*****
f4d2500eded3ca30c12faa90e685841a61cf1b40
Raven****
6886ae10ad70a72dc2a7dac2d6fb73b67cc988d3
dryca****
fc5a0e4fdc73e5e5e36610bd61fa67d8f30430ba
Raven********
cdde460dd94480faf22807471fcc271ae68254ee
Raven********
a882a1c42dab98fdada8905d83857e38e984d967
Willowwtheway
Raven****
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
Raven************
059438561804ec4541d4af7cccfe996c274af505
Raven******
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven**************
91906facec367bb75cbc60e64b613445eae8f53e
Raven********
a882a1c42dab98fdada8905d83857e38e984d967
Thecucumberprincess
Raven******
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven*******
b4431117a81897348480bea71c3f04c26de69043
Raven*******
0553422bb3f793ca05c5a1518af4cd11fdcb5cf1
Raven********
a882a1c42dab98fdada8905d83857e38e984d967
samhain
Raven****
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
rothraven1984
Raven*********
11491096ced15a9985ce1cee2290605c301d33e5
Raven******
30a952e62f7a9bf08912b374d2d80c37dc8548b1
All of the above were retrieved from a database of breaches, which kindly provides us with a username/email, a censored password, the length of the password, and a SHA1 hash of the completed password. What's a SHA1 hash? Well, blah blah blah, one way algorithm, blah blah blah, the point is strings of characters go in, hexadecimal comes out. We don't care too much about how it works, but more importantly a specific phrase going in will always result in the same output coming out. Some of you may have noticed that certain hashes share colors, and the more observant may have noticed that those hashes are the same values, meaning that theoretically that's the same password used in different places.
By remarkable coincidence, the SHA1 algorithm is built into the Java libraries and if we look at the length of those passwords, there actually aren't many characters we don't know. So theoretically, if we consider the following:
A base password of Raven with four unknown characters (****)
Uppercase letters – 26
Lowercase letters – 26
Numbers – 10
Our formula is (total possible characters) ^ (number of unknown characters) = total possible passwords
With 62 possible characters (assuming no symbols) and 4 unknown characters = 62^4 = 14,776,336 possible passwords with the starting phrase Raven
If we just increment through the possible passwords, SHA1 hash it and compare, that's well within the realms of brute forcing a match within a very reasonable time frame (I'm impatient and don't want to wait hours to check results) as my computer can hash and test 900 million passwords in 15 minutes (single thread, no parallel computing because I'm lazy).
But before I do that, I need to check to make sure that the hidden character length is accurate and that no salting of passwords was done (where something extra and unknown to me was added to the input to change the output hash). A quick search for a username and password I haven't used in over two decades, and I can confirm that there's an extra placeholder * to fuck up the displayed length and that the hashes are definitely not salted. This is great news, as it means there's only 238,328 passwords to search through instead of 15 million (62^3 vs 62^4), and we can see that some of the hashes match exactly which means some of the passwords have been reused (which was the original question that prompted this investigation). Let her rip.
Username/Email
Obscured password
SHA1 hash
Vivianazariahmamamia
Bratz***********************
09a45a23abe97e5da2419fc43bc18c2e128f2b1a
Raven********
823aeb07dc9b27cd0ce996f9bb7fca16604ae203
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
Raven******
b4431117a81897348480bea71c3f04c26de69043
RavenR889
b2d57d275ba170c5171e608763eae55cfe6e6dd2
WinxClubbb
5623f3b290e8baacc6f353a124f14d921f648140
Willowtheway
OxKyliaxx
f4d2500eded3ca30c12faa90e685841a61cf1b40
RavenR78
6886ae10ad70a72dc2a7dac2d6fb73b67cc988d3
drycat32
fc5a0e4fdc73e5e5e36610bd61fa67d8f30430ba
Raven*******
cdde460dd94480faf22807471fcc271ae68254ee
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
Willowwtheway
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
Raven***********
059438561804ec4541d4af7cccfe996c274af505
Raven*****
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven*************
91906facec367bb75cbc60e64b613445eae8f53e
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
Thecucumberprincess
Raven*****
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven******
b4431117a81897348480bea71c3f04c26de69043
Raven******
0553422bb3f793ca05c5a1518af4cd11fdcb5cf1
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
samhain
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
rothraven1984
Raven********
11491096ced15a9985ce1cee2290605c301d33e5
Raven*****
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Would you look at that, we got some matches. Unfortunately, we're not getting matches on the hashes of the other shorter passwords that I've tested, which means we need to make a few changes to the program to accommodate the use of symbols. This is not ideal as it's going to massively expand the search space and make this take longer, and yet again, I'm impatient and don't want to wait hours to get a match. Searching the possible ASCII space is not my idea of a good time especially as passwords grow in length, so instead let's stick to symbols that will commonly be used like the ones on the number keys. A quick rewrite, test, and execution later...
Username/Email
Obscured password
SHA1 hash
Vivianazariahmamamia
Bratz***********************
09a45a23abe97e5da2419fc43bc18c2e128f2b1a
Raven********
823aeb07dc9b27cd0ce996f9bb7fca16604ae203
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
RavenR88&^%
b4431117a81897348480bea71c3f04c26de69043
RavenR889
b2d57d275ba170c5171e608763eae55cfe6e6dd2
WinxClubbb
5623f3b290e8baacc6f353a124f14d921f648140
Willowtheway
OxKyliaxx
f4d2500eded3ca30c12faa90e685841a61cf1b40
RavenR78
6886ae10ad70a72dc2a7dac2d6fb73b67cc988d3
drycat32
fc5a0e4fdc73e5e5e36610bd61fa67d8f30430ba
Raven*******
cdde460dd94480faf22807471fcc271ae68254ee
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
Willowwtheway
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
Raven***********
059438561804ec4541d4af7cccfe996c274af505
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven*************
91906facec367bb75cbc60e64b613445eae8f53e
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
Thecucumberprincess
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
RavenR88&^%
b4431117a81897348480bea71c3f04c26de69043
RavenR88&&@
0553422bb3f793ca05c5a1518af4cd11fdcb5cf1
Raven*******
a882a1c42dab98fdada8905d83857e38e984d967
samhain
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
rothraven1984
Raven********
11491096ced15a9985ce1cee2290605c301d33e5
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Okay, there's a bit of a pattern going on here which is good because I remain impatient and want to cut down on the possible search space to make this go faster.
To search for a password of length 11 using RavenR as a base:
5 unknown characters
Uppercase letters – 26
Lowercase letters – 26
Numbers – 10
Symbols – 10
(72^5) = 1,934,917,632
While not outside of the realms of easily finding it through pure brute force, it's taking long enough that it's wearing on my patience so lets build on the observed patterns and expand our known starting phrase. So instead let's do this:
Base – RavenR
5 unknown characters
Letters – None
Numbers – 5 (6,7,8,9,0) – what we've seen before, and what can be fat fingered
Symbols – 9 (!,@,#,%,$,%,^,&,*) - see above
(14^5) = 537,824 possible passwords
For six unknown characters = (14^6) = 7,529,536 possible passwords
For seven unknown characters = (14^7) = 105,413,504 possible passwords
For eight unknown characters = (14^8 ) = 1,475,789,056 possible passwords
If we get that far, we're getting into the range where it's again taking too long for my liking, so we need to make some guesses to expand the known phrase to reduce the search space. Based on the number of times we've seen R88 pop up as the first of the unknown characters that seems like a good addition.
And wouldn't you know it...
Username/Email
Obscured password
SHA1 hash
Vivianazariahmamamia
Bratz***********************
09a45a23abe97e5da2419fc43bc18c2e128f2b1a
RavenR88&&^^^
823aeb07dc9b27cd0ce996f9bb7fca16604ae203
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
RavenR88&^%
b4431117a81897348480bea71c3f04c26de69043
RavenR889
b2d57d275ba170c5171e608763eae55cfe6e6dd2
WinxClubbb
5623f3b290e8baacc6f353a124f14d921f648140
Willowtheway
OxKyliaxx
f4d2500eded3ca30c12faa90e685841a61cf1b40
RavenR78
6886ae10ad70a72dc2a7dac2d6fb73b67cc988d3
drycat32
fc5a0e4fdc73e5e5e36610bd61fa67d8f30430ba
RavenR77&&&@
cdde460dd94480faf22807471fcc271ae68254ee
RavenR88&&&@
a882a1c42dab98fdada8905d83857e38e984d967
Willowwtheway
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
RavenR88&&^^^^^^
059438561804ec4541d4af7cccfe996c274af505
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Raven*************
91906facec367bb75cbc60e64b613445eae8f53e
RavenR88&&&^
a882a1c42dab98fdada8905d83857e38e984d967
Thecucumberprincess
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
RavenR88&^%
b4431117a81897348480bea71c3f04c26de69043
RavenR88&&@
0553422bb3f793ca05c5a1518af4cd11fdcb5cf1
RavenR88&&&^
a882a1c42dab98fdada8905d83857e38e984d967
samhain
RavenR88
66d3fe3a5bd6e0b55c967b1417f65e7b10acce6c
rothraven1984
RavenR88&&&@@
11491096ced15a9985ce1cee2290605c301d33e5
RavenR88&^
30a952e62f7a9bf08912b374d2d80c37dc8548b1
Before you go off weening, remember: usernames, passwords and hashes have been changed to protect the stupid even if she almost certainly doesn't deserve it. All data used was found from querying publicly available databases.
We are left with two unknown passwords, one of which doesn't follow the pattern established by the rest (on top of being too long to brute force in a short time frame) and another which gives no results with our known phrase so there may be some letters or different numbers thrown in but I'm too lazy to check for it. Given what we know of Emily and her interests, we can safely assume that most of these are indeed ones used by her with the OxKyliaxx and drycat32 ones being possible exceptions as they don't fit the thematic theme that the rest seem to.
Bonus points if you can figure out what phrases I used to compute the hashes of the unknowns.
But @Catgirls are Love, why go through this and why bother writing up this giant wall of autism?
No reason whatsoever.
TL;DR – On top of everything else you shouldn't be doing but you do anyways, don't reuse your passwords Emily. Feel free to direct any comments or complains to superbiaamoris@proton.me.
@Catgirls are Love
Did you use the actual WillowtheWay email? because it would be a very strange coincidence if WillowtheWay (who is totally not Emily) used the same passwords as Emily.
@Catgirls are Love
Did you use the actual WillowtheWay email? because it would be a very strange coincidence if WillowtheWay (who is totally not Emily) used the same passwords as Emily.
See names, passwords and hashes have been changed to protect the stupid. I will neither confirm nor deny what the names/passwords have been changed from.
Uh, I hope some of you read my latest post, but I'll say it here too..
what's the point of publicly shaming a person when it pisses them off and only gives usually temporary entertainment thrills?
it won't fix your initial concern.
communication would be MUCH better .
than ALL of this unneeded bitching.
All Public outing of an LOLCOW does is pretty much piss them off.
Ya aint changing my mind, that's like forcing me to do something.
TEACH me.
I am actually waiting for you all to TEACH.
PROPERLY WITH NO INSULTS.
because drama as you have seen, gives you NO fix.
only pisses the people off.
simple ^^
enjoy having your Lolcowdome destroyed in its mission :3
If Emily sees this and is able to comprehend what it means, she is going to flip her shit, eat it for rage fuel, and sleep next to her computer for the next year.
Uh, I hope some of you read my latest post, but I'll say it here too..
what's the point of publicly shaming a person when it pisses them off and only gives usually temporary entertainment thrills?