vot canva
[CLIKE] https://mega.nz/#!BK4zFaTI!Bt0lhggPmNkLFXaBKDDmOCtlKrF-DgKqw4D07zbzKBU [/ CLIKE][/CLIKE]
[CLIKE] https://mega.nz/#!BK4zFaTI!Bt0lhggPmNkLFXaBKDDmOCtlKrF-DgKqw4D07zbzKBU [/ CLIKE][/CLIKE]
Последнее редактирование:
Что именно не понятно?что это такое?
да это то же самое. но на rf надо платить или получать кредиты![]()
Canva Database - Leaked, Download! | RaidForums
Hello RaidForums Community, Today I have uploaded the Canva Database for you to download for free, thanks for reading and enjoy! |Notes| In May 2019, the g...raidforums.com
veri olabilir mi?
![]()
Have I Been Pwned: Who's Been Pwned
Every breached website added to Have I Been Pwned appears here on the Who’s Been Pwned page. As of today, there are 947 breached sites listed.haveibeenpwned.com
Compromised data: Email addresses, Geographic locations, Names, Passwords, Usernames
Permalink
DROP TABLE IF EXISTS `user`;
/*!40101 SET @saved_cs_client = @@character_set_client */;
/*!40101 SET character_set_client = utf8 */;
CREATE TABLE `user` (
`_id` int(11) NOT NULL AUTO_INCREMENT,
`id` char(11) CHARACTER SET ascii COLLATE ascii_bin NOT NULL,
`creation_date` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP,
`email` varchar(255) DEFAULT NULL,
`phone_number` varchar(25) DEFAULT NULL,
`email_status` char(1) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL,
`username` varchar(255) DEFAULT NULL,
`display_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL,
`first_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL,
`last_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL,
`temporary` bit(1) NOT NULL,
`roles` varchar(45) CHARACTER SET ascii COLLATE ascii_bin NOT NULL,
`deactivated` bit(1) NOT NULL,
`ui_info` varchar(255) NOT NULL,
`homepage` varchar(255) DEFAULT NULL,
`city` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL,
`country_code` char(2) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL,
`locale` varchar(255) NOT NULL,
`personal_brand` int(11) DEFAULT NULL,
`personal_brand_id` char(11) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL,
`avatar` int(11) DEFAULT NULL,
PRIMARY KEY (`_id`),
UNIQUE KEY `id` (`id`),
UNIQUE KEY `id_2` (`id`),
UNIQUE KEY `email` (`email`),
UNIQUE KEY `username` (`username`),
UNIQUE KEY `phone_number` (`phone_number`),
KEY `personal_brand` (`personal_brand`),
KEY `personal_brand_id` (`personal_brand_id`)
) ENGINE=InnoDB AUTO_INCREMENT=139494421 DEFAULT CHARSET=utf8;
/*!40101 SET character_set_client = @saved_cs_client */;
пароли (хеши бкрипт, так мило с их стороны понтоваться алгоритмом фронтенда в новостях) не утекли.The HIBP notification has led some users to ask if their passwords were compromised. The simple answer is no. What was accessed was individually salted and bcrypt-hashed passwords.
Вот только среди
Код:DROP TABLE IF EXISTS `user`; /*!40101 SET @saved_cs_client = @@character_set_client */; /*!40101 SET character_set_client = utf8 */; CREATE TABLE `user` ( `_id` int(11) NOT NULL AUTO_INCREMENT, `id` char(11) CHARACTER SET ascii COLLATE ascii_bin NOT NULL, `creation_date` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP, `email` varchar(255) DEFAULT NULL, `phone_number` varchar(25) DEFAULT NULL, `email_status` char(1) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL, `username` varchar(255) DEFAULT NULL, `display_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL, `first_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL, `last_name` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL, `temporary` bit(1) NOT NULL, `roles` varchar(45) CHARACTER SET ascii COLLATE ascii_bin NOT NULL, `deactivated` bit(1) NOT NULL, `ui_info` varchar(255) NOT NULL, `homepage` varchar(255) DEFAULT NULL, `city` varchar(255) CHARACTER SET utf8mb4 COLLATE utf8mb4_unicode_ci DEFAULT NULL, `country_code` char(2) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL, `locale` varchar(255) NOT NULL, `personal_brand` int(11) DEFAULT NULL, `personal_brand_id` char(11) CHARACTER SET ascii COLLATE ascii_bin DEFAULT NULL, `avatar` int(11) DEFAULT NULL, PRIMARY KEY (`_id`), UNIQUE KEY `id` (`id`), UNIQUE KEY `id_2` (`id`), UNIQUE KEY `email` (`email`), UNIQUE KEY `username` (`username`), UNIQUE KEY `phone_number` (`phone_number`), KEY `personal_brand` (`personal_brand`), KEY `personal_brand_id` (`personal_brand_id`) ) ENGINE=InnoDB AUTO_INCREMENT=139494421 DEFAULT CHARSET=utf8; /*!40101 SET character_set_client = @saved_cs_client */;
Я что-то пассвордов не вижу.
Да и по ссылке https://support.canva.com/contact/customer-support/may-24-security-incident-faqs/ пишут, что
пароли (хеши бкрипт, так мило с их стороны понтоваться алгоритмом фронтенда в новостях) не утекли.
Отсюда вопрос. Пароли не утекли или есть более одной базы?
а какие стоблцы есть?я не знаю почему я не могу редактировать свой пост
Скрытое содержимое
я не знаю почему я не могу редактировать свой пост
Скрытое содержимое
Можешь перезалить, опять удаленСкрытое содержимое