Disqus will reset passwords for 17.5 million users... who may have been affected in 2012:
Blog comment service provider Disqus was hacked back in 2012, exposing 17.5 million user email addresses, the firm admitted on Friday.
The breached information also included Disqus user names, sign-up dates and last login dates in plain text, as well as passwords hashed and salted with the crackable SHA1 algorithm for about one-third of users.
The data theft appears to have occurred back in July 2012, with some of the information in the targeted database dating back as far as 2007, according to a blog post from the firm.
Disqus is in the process of notifying those affected and forcing a password reset as a precaution.
Also at Engadget.
(Score: 0) by Anonymous Coward on Tuesday October 10 2017, @12:22PM (1 child)
So comments from all of those sites would appear here? Brilliant!
Would they be randomly distributed across threads or assigned to only those with low comment counts?
(Score: 2) by bootsy on Wednesday October 11 2017, @09:07AM
You would run an instance of the soylent setup for each site and charge them a flat fee for the service. It would not affect the main site at all.
Disqus made money by doing exactly this but their setup sucked.