Despite promising customers to delete their user data from the site for a fee, the company actually retained the data on ALM’s servers, the hackers claimed."Too bad for those men, they’re cheating dirtbags and deserve no such discretion,” the hackers wrote.
You'll also get free relationship coaching via blogs and a popular message board.
"I love it when I'm called and told I have 15 minutes to get to someplace where I'll be greeted at the door with a surprise—maybe lingerie, nakedness. I like lots of foreplay and stamina, fun, discretion, oral, even willingness to experiment—*smile*"Passwords released in the data dump appear to have been hashed using the bcrypt algorithm for PHP, but Robert Graham, CEO of Erratasec, says that despite this being one of the most secure ways to store passwords, "hackers are still likely to be able to 'crack' many of these hashes in order to discover the account holder's original password." If the accounts are still online, this means hackers will be able to grab any private correspondence associated with the accounts.
It's notable, however, that the cheating site, in using the secure hashing algorithm, surpassed many other victims of breaches we've seen over the years who never bothered to encrypt customer passwords."We’re so used to seeing cleartext and MD5 hashes," Graham says.
This data, which amounts to millions of payment transactions going back to 2008, includes names, street address, email address and amount paid, but not the full credit card numbers; instead it includes just four digits for each transaction, which may in fact be the last four digits of the credit card numbers or simply a transaction ID unique to each charge.
One analysis of email addresses found in the data dump also shows that some 15,000 are It's not clear, however, how many of these are legitimate addresses.