Disqus will reset passwords for 17.5 million users... who may have been affected in 2012:
Blog comment service provider Disqus was hacked back in 2012, exposing 17.5 million user email addresses, the firm admitted on Friday.
The breached information also included Disqus user names, sign-up dates and last login dates in plain text, as well as passwords hashed and salted with the crackable SHA1 algorithm for about one-third of users.
The data theft appears to have occurred back in July 2012, with some of the information in the targeted database dating back as far as 2007, according to a blog post from the firm.
Disqus is in the process of notifying those affected and forcing a password reset as a precaution.
Also at Engadget.
(Score: 2) by bootsy on Tuesday October 10 2017, @09:17AM (2 children)
We've missed the chance to do this but if we had offered the Soylent News comment engine as a replacement for Disqus I think we could have made money for the site.
The fast loading low JavaScript back end with the improved rating system would be perfect for the Disqus use case of a website wanting to outsource the commenting engine.
(Score: 0) by Anonymous Coward on Tuesday October 10 2017, @12:22PM (1 child)
So comments from all of those sites would appear here? Brilliant!
Would they be randomly distributed across threads or assigned to only those with low comment counts?
(Score: 2) by bootsy on Wednesday October 11 2017, @09:07AM
You would run an instance of the soylent setup for each site and charge them a flat fee for the service. It would not affect the main site at all.
Disqus made money by doing exactly this but their setup sucked.