Originally Posted by hellsing9
Very good explanation, BUT...How come a *Hacker* or *Hackers* got usernames and passwords from some *shady* website?.
So if i try bruteforce PSN with random usernames and passwords with zombie bots they perfom a lockdown on a certain sector?, In some credit card site i could accept that but on PSN no.
They say that only 0.1% were affected by this, and I said it's my point of view = Sony Failed Again. On minor scale they failed again that cannot be refuted with some poor excuse about a automatic lockdown due to masive login attemps.
If you perform a random bruteforce like i said, a massive attemp to login with RANDOM different usernames and passwords is NOT the same sceneario. I bet ten dollars that the lockdown will be not performed.
Ergo the security of SONY = PSN it's still in bad shape.
This is not a RANDOM case, the *hackers* or *hacker* got solid data about users and passes that were legit.
Get my point?
No, actually, not in the least. Sony did precisely what they should've done. People got the passwords from somewhere else because you're much more likely to get a hit with a confirmed name/password combo than from an attempted bruteforce.
Sony locked out accounts that were associated with a hack on another website where those e-mail address/password combos were legitimate. This makes sense, because there's a much higher chance of those combos working on PSN as well, and if the password was just recently changed after the hack (for example) that'd be a sign of suspicious activity.
Besides, you're arguing entirely from speculation and then attacking Sony for not responding to something that may not even be happening. What other nonexistent threats have they not responded to well enough to meet your satisfaction?