Skip to content

100% Private Proxies – Fast, Anonymous, Quality, Unlimited USA Private Proxy!

Get your private proxies now!

Repercussions on Google account used to access a compromised service

Suppose the following scenario:

  • A cloud service reports a breach in which user account information (usernames and password data, e.g. password hashes) was accessed.
  • The attacker has sufficient resources to recover passwords from the hashes (worst-case assumption, not necessarily realistic)—or the service used a sufficiently weak hash algorithm (or even stored passwords in plain text).
  • Alice has an account on that service. However, she logs in with her Google account.

If the designers of the authentication protocol used did their homework, I assume the compromised service would not hold any data that would enable an attacker to access Alice’s account, and Alice would not need to take any actions in response.

Is my assumption correct, or have I overlooked something?

Author AdminPosted on May 28, 2019Categories proxiesTags Access, account, compromised, Google, repercussions, service, used

Post navigation

Previous Previous post: $45 Logo Design
Next Next post: Algorithm for fewest moves in 1’s, 10’s, 100’s, etc
100% Private Proxies – Fast, Anonymous, Quality, Unlimited USA Private Proxy! Proudly powered by WordPress

DreamProxies - Cheapest USA Elite Private Proxies 100 Private Proxies 200 Private Proxies 400 Private Proxies 1000 Private Proxies 2000 Private Proxies ExtraProxies.com - Buy Cheap Private Proxies Buy 50 Private Proxies Buy 100 Private Proxies Buy 200 Private Proxies Buy 500 Private Proxies Buy 1000 Private Proxies Buy 2000 Private Proxies ProxiesLive Proxies-free.com New Proxy Lists Every Day Proxies123