Adobe Leak Tester
Are you affected by the
Adobe credential leak? Here you can
safely check whether your email address appears in the users.tar.gz file.
The email address to check for:
Background
- Unknown Adobe services got compromised and as a result the email address, encrypted password and the password hint for 153 million users have been leaked.
Why should I care?
- Many people are lazy and often use the same password on multiple sites. Unfortunately Adobe employed encryption rather than hash function when storing the passwords. It is believed that the encryption may get cracked at a later date revealing all the encrypted passwords. If this happens the attackers will learn your password, regardless of lenght or complexity.
- If you used an unique password that wasn't used elsewhere, and you don't have a problem with the password being discovered then you are fine. Otherwise you should assume that the password has been discovered and change the passwords to all services sharing it.
Technical notes
- Only the MD5 hash of the email address is sent to the server. The MD5 hashes are neither logged nor stored anywhere.
- The search implementation has no performance issues due to use of binary search over the MD5 hashes of the affected email addresses. There are no delays, the results are immediate.
- It is important to note that you must enter you email address exactly like it was used at Adobe site or the search will fail.
Author
Harry Sintonen <sintonen@iki.fi>