Discussion about this post

User's avatar
Neural Foundry's avatar

Fantastic breakdown of what's honestly a massive exposure event. The recommendation to use breach databases within password managers is smart, but theres something almost paradoxical about relying on software to protect against threats that partially stem from software vunerabilities. I switched to hardware keys for critical accounts a while back and the peace of mind is worth the friction. At some point the collective burden on individuals to constantly monitor becomes unsustainable infrastructure.

No posts

Ready for more?