<p dir="ltr">If it's a phishing scenario, no matter how they store and protect passwords, they'd be compromised.</p>
<p dir="ltr">Keeping in mind, this is not confirmed, and at this point is pure speculation.</p>
<p dir="ltr">As for who made them the password police, that is one of the inherent duties in providing such a service. If they knew your account was compromised and did nothing about it, you'd be emailing with a very different attitude.</p>
<div class="gmail_quote">On Apr 5, 2016 12:20 PM, "Joey Kelly via Outages" <<a href="mailto:outages@outages.org">outages@outages.org</a>> wrote:<br type="attribution"><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On 04/05/2016 10:51 AM, DJ Anderson via Outages wrote:<br>
> I got one of those a few weeks ago.<br>
><br>
> When I inquired about it I was told that the password I was using was found on some leaked password list and due to that they had set a temporary password to protect my account.<br>
><br>
> -DJ<br>
<br>
<br>
<br>
Does that not imply they are not using salted hashes, but storing the<br>
passwords in plaintext? Or maybe they're intercepting the passwords and<br>
testing them against a dictionary? I might be OK with the latter, maybe<br>
(but who appointed them to be the world's password police?)<br>
<br>
--Joey Kelly<br>
<br>
<br>
<snip><br>
<br>
--<br>
Joey Kelly<br>
Minister of the Gospel and Linux Consultant<br>
<a href="http://joeykelly.net" rel="noreferrer" target="_blank">http://joeykelly.net</a><br>
<a href="tel:504-239-6550" value="+15042396550">504-239-6550</a><br>
_______________________________________________<br>
Outages mailing list<br>
<a href="mailto:Outages@outages.org">Outages@outages.org</a><br>
<a href="https://puck.nether.net/mailman/listinfo/outages" rel="noreferrer" target="_blank">https://puck.nether.net/mailman/listinfo/outages</a><br>
</blockquote></div>