• Psythik@lemm.ee
    link
    fedilink
    English
    arrow-up
    3
    ·
    2 hours ago

    Since when do you have to link your phone number to your Steam account? I’ve had an account for as long as Steam has existed, and I’ve never been asked to provide my phone number.

  • damdy@lemm.ee
    link
    fedilink
    English
    arrow-up
    8
    ·
    11 hours ago

    It’s good to have a constant in the current world, steam seems okay, I love what they’re doing for Linux gamers, I think they should reduce their share by at least 5%,but they do a good service and seem competent.

    • el_bhm@lemm.ee
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 hours ago

      From what I understand personal info is peanuts. You buy it in bulk, cheap.

      • ColeSloth@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        2
        ·
        2 hours ago

        It was put out that everyone should change their passwords. That kind of info for like 90 million steam accounts would fetch a much higher price or ransom than some personal info on a bunch of people like names, phone numbers and an address.

    • NONE@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      4
      ·
      12 hours ago

      I know, right? It’s too little for that amount of information. I mean, almost 100 million compromised accounts is not few.

  • uranibaba@lemmy.world
    link
    fedilink
    English
    arrow-up
    53
    ·
    21 hours ago

    https://store.steampowered.com/news/collection/steam?emclan=103582791457287600&emgid=533224478739530145

    You may have seen reports of leaks of older text messages that had previously been sent to Steam customers. We have examined the leak sample and have determined this was NOT a breach of Steam systems.

    We’re still digging into the source of the leak, which is compounded by the fact that any SMS messages are unencrypted in transit, and routed through multiple providers on the way to your phone.

    The leak consisted of older text messages that included one-time codes that were only valid for 15-minute time frames and the phone numbers they were sent to. The leaked data did not associate the phone numbers with a Steam account, password information, payment information or other personal data. Old text messages cannot be used to breach the security of your Steam account, and whenever a code is used to change your Steam email or password using SMS, you will receive a confirmation via email and/or Steam secure messages.

    You do not need to change your passwords or phone numbers as a result of this event. It is a good reminder to treat any account security messages that you have not explicitly requested as suspicious. We recommend regularly checking your Steam account security at any time at

    https://store.steampowered.com/account/authorizeddevices

    We also recommend setting up the Steam Mobile Authenticator if you haven’t already, as it gives us the best way to send secure messages about your account and your account’s safety.

  • Destide@feddit.uk
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    1
    ·
    20 hours ago

    Never a bad thing to have a people change up their passwords and address security

      • Destide@feddit.uk
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        19 hours ago

        Why not both? My main argument was that while some seem to be saying that the outcry wasn’t justified, it probably made many people have a closer look at their security.

        • scops@reddthat.com
          link
          fedilink
          English
          arrow-up
          20
          ·
          18 hours ago

          I believe the main concern for periodic password changes is that most people won’t take the time to generate unique passwords each time. They will typically iterate a password over time, meaning a couple leaked passwords will narrow down guesswork to a trivial number of guesses and remove the benefit of the timed changes.

          NIST no longer recommends password expirations except for cases where it is believed that a breach occurred.

          • JustAnotherKay@lemmy.world
            link
            fedilink
            English
            arrow-up
            14
            ·
            18 hours ago

            The other issue with periodic password changes, particularly in the workplace but also relevant in normal life, is that it causes people to write down their password. The issues with that should be glaring enough

            • ripcord@lemmy.world
              link
              fedilink
              English
              arrow-up
              1
              ·
              13 hours ago

              What if they write it down in a single, centralizedz password manager? Which itself could be compromised?

              That’s the only way I can keep the literally 100 accounts ive accumulated over the years straight, without reusing passwords.

              And while I believe that is reasonably secure in my case, if that got compromised I’d be pretty screwed (well, 2fa would probably still limit the worst of it). But most people probably wouldn’t even be that secure about it.

              • mic_check_one_two@lemmy.dbzer0.com
                link
                fedilink
                English
                arrow-up
                3
                ·
                11 hours ago

                Because it’s about reducing attack vectors, and your password manager isn’t likely going to be a vector. Attackers are going to try and net as many users as possible, which means (aside from heads of state or C-suite executives being spear phished) they aren’t targeting individuals… They’re targeting the companies that those individuals have accounts with. Essentially, you as an individual aren’t important enough to bother trying to hack individually. As long as your password manager has a sufficiently long password, (and you’re not one of the 1% of individuals who are rich or powerful enough to actually target), hackers won’t even bother trying.

                With shared passwords, every single service you use is a potential attack vector; A breach on any of them becomes a breach on all of them, because they’re all using the same credentials. And breaches happen all the time, both because any single individual employee can be a potential weakness in the company’s security, (looking at the accountant who plugged a “lost and found” flash drive into their computer, and got the entire department hit with ransomware), and because the company is more likely to be targeted by attackers. With unique passwords and a manager, a breach on any service is only a breach on that service.

                So by using a password manager, you essentially accept that breaches in individual companies are inevitable and out of your control, and work to minimize the damage that each one can do.