• Mozilla has launched a paid subscription service called Mozilla Monitor Plus, which monitors and removes personal information from over 190 sites where brokers sell data.
  • The service is priced at $8.99 per month and is an extension of the free dark web monitoring service Mozilla Monitor (previously Firefox Monitor).
  • Basic Monitor members receive a free scan and one-time removal sweep, while Plus members get continual monthly data broker scans and removal attempts.

Archive link: https://archive.ph/YdY3R

  • Static_Rocket@lemmy.world
    link
    fedilink
    English
    arrow-up
    12
    arrow-down
    20
    ·
    edit-2
    9 months ago

    Something akin to haveibeenpwned.com password hash partial match? Can that even be done with this data?

    Edit: You goofs know you can calculate the hash locally and submit it for review without actually exposing your password to them right? That’s how bitwarden does it’s check. https://www.troyhunt.com/ive-just-launched-pwned-passwords-version-2/#cloudflareprivacyandkanonymity

    Ah, but Mozilla isn’t even trying to do anything cool like that. They just use onereap and those fuckers look shady. Quotes from their privacy policy: https://onerep.com/privacy-policy#what-data-we-collect-and-how-we-do-that

    We use your Personal Information for a number of purposes, which may include the following:

    [snip]

    • To display advertisements to you.
    • To manage our Affiliate marketing program.

    There will be times when we may need to disclose your Personal Information to third parties. We may disclose your Personal Information to:

    [snip]

    • Third-party service providers and partners who assist us in the provision of the Services and Website, for example, (a) those who support delivery of or provide certain features in connection with the Services and Website (e.g. Stripe, a payment services provider; Sendgrid, an email delivery service; HubSpot, a CRM platform, and Sentry, a crash reporting platform); (b) providers of analytics and measurement services (e.g. Google Analytics, ProfitWell etc.); © providers of technical infrastructure services (e.g. Microsoft Azure, Google Cloud, and Amazon AWS); (d) providers of customer support services (e.g. Zendesk); (e) those who facilitate conduct of surveys (e.g. Hotjar); (f) those who help to advertise, market or promote our Services and Website (e.g. Mautic, Facebook Ads, Google Ads, Linkedin Ads, Reddit Ads, and Microsoft Ads);

    The bastards

    • NaN@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      63
      arrow-down
      1
      ·
      edit-2
      9 months ago

      No. If your name is Dave Jones they have to look around those broker sites for Dave Jones. If those sites were using hashes then they could use hashes too.

      This is no different than any credit or identity monitoring service. The need to give them basic information should be obvious, people have to decide if the company is trustworthy or not.

      • Peer@discuss.tchncs.de
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        5
        ·
        9 months ago

        They could just look for names, then hash those names and compare them to your hashed name. So technically that don’t need to store your data, just hashes.

        • Lmaydev@programming.dev
          link
          fedilink
          English
          arrow-up
          7
          arrow-down
          1
          ·
          edit-2
          9 months ago

          I’m all for privacy but worrying about giving one of the most trustworthy companies around your name seems a bit much.

          You’d also have to give them your card details to pay for it.

          This would also require searching and indexing the entire system as opposed to searching it.

    • Steve@communick.news
      link
      fedilink
      English
      arrow-up
      23
      arrow-down
      1
      ·
      9 months ago

      The front page there is literally: “Give us your email, so we can find leaks of your email.” It’s exactly the same thing.

        • Nyfure@kbin.social
          link
          fedilink
          arrow-up
          14
          arrow-down
          1
          ·
          9 months ago

          To be fair, you can check the code they run or just use the API.
          The hash is calculated locally, cut-off and then send, the server returns all hashes it found which start with your one and then you can check if yours in in the list locally.

          • claudiop@lemmy.world
            link
            fedilink
            English
            arrow-up
            9
            ·
            9 months ago

            Y’know that you can see the requests your browser makes, right? Mind putting in here a screenshot of HIBP uploading your password or any complete hash of it?

            Failing to provide that grants you the “talking shit out of ya ass” award.

    • admiralteal@kbin.social
      link
      fedilink
      arrow-up
      15
      arrow-down
      1
      ·
      9 months ago

      No, because you are asking the data broker to do something with your data that they possess. It is not possible for them to delete your data without knowing which are your data.

      The only alternative is fully banning this kind of data collection. Which would be nice, but isn’t happening anytime soon.