![]() ![]() I actually deauthorized every device except for the laptop and desktop right in front of me. There were some old devices on the list, but I don't have reason to believe any of the devices could have been compromised, but I started deauthorizing devices with reckless abandon. I checked my list of authorized devices.The attempts listed IP addresses they varied across the fraudulent attempts. I opened the event log and saw a corresponding list of 2FA attempts.I went went to my email, waited a bit to ensure there was only one recent 2FA email, entered it, and was in. Then I went to the web portal and logged in, which of course triggered 2FA.I immediately checked my password manager to confirm that my password was a good password, and yes, it was long, random, and not used anywhere else.It all started when I received numerous 2FA emails from.Tl dr: After an apparent(?) account breach, I deactivated an authorized device from my account, but was still able to access my files from that device simply by canceling the error dialog! I even went so far as deleting my entire account and I can still access my files from the de-authorized device. I still don't know if someone gained access to my private data or not. I just had the worst security experience of my life. Just make sure to tag the post with the flair and give a little background info/context. On Fridays we'll allow posts that don't normally fit in the usual data-hoarding theme, including posts that would usually be removed by rule 4: “No memes or 'look at this '” We are not your personal archival army.No unapproved sale threads, advertisement posts, or giveaways.No memes or 'look at this old storage medium/ connection speed/purchase' (except on Free Post Fridays).Search the Internet, this subreddit and our wiki before posting.R/DataHorader 2013-2023 Searchable Archives Historic Reddit Archives & Download Tools, Etc.ģ.3v Pin Reset Directions :D / Alt Imgur link And we're trying really hard not to forget. Along the way we have sought out like-minded individuals to exchange strategies, war stories, and cautionary tales of failures. ![]() Everyone has their reasons for curating the data they have decided to keep (either forever or For A Damn Long Timetm). government or corporate espionage), cultural and familial archivists, internet collapse preppers, and people who do it themselves so they're sure it's done right. Among us are represented the various reasons to keep data - legal requirements, competitive requirements, uncertainty of permanence of cloud services, distaste for transmitting your data externally (e.g.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |