And this, kids, is why we never ever set up easy-to-guess passwords.
-
And this, kids, is why we never ever set up easy-to-guess passwords. Even in testing, even temporarily. Just pwgen it, every time.
> accessing the museum's video surveillance server required typing the all-too-obvious word: LOUVRE
-
undefined oblomov@sociale.network shared this topic on
-
And this, kids, is why we never ever set up easy-to-guess passwords. Even in testing, even temporarily. Just pwgen it, every time.
> accessing the museum's video surveillance server required typing the all-too-obvious word: LOUVRE
@rysiek And this, kids, is why we don't trust sensational news from an obscure Italian magazine in English.
Yes, in 2014 a security audit revealed significant flaws in the Louvre cyber-security, including the usage of: "LOUVRE" as a password.
No, we don't know what the current passwords are and which flaws have been adressed in the past eleven years. So we stay alert but don't hawk about such allegations as truth.https://dailycaller.com/2025/11/03/louvre-password-security-system-heist/
-
And this, kids, is why we never ever set up easy-to-guess passwords. Even in testing, even temporarily. Just pwgen it, every time.
> accessing the museum's video surveillance server required typing the all-too-obvious word: LOUVRE
@rysiek
Museum officials acknowledged the oversight and swiftly changed to a more secure password (LOUVRE2).