> The number of passwords and the severity of the hack was not uncovered until today. The passwords were stored using unsalted MD5 hashing
I'm 100% sure it was known it was MD5 before, and I'm 100% sure I've seen pastebins with lots of successfully bruteforced hashes, because my password was among them.
Uh oh. You might be on to something. Salts are pretty much always stored right next to the hash, right? If the hack doesn't contain them, maybe they were doing something "clever" like that.
Imagine your country offers a tax refund for installing solar panels. Because of this, you decide to buy and install solar panels. Lateron, it is decided that your country shouldn't have offered this refund for this or that reason.
Would you feel that it is fair that you have to pay up, instead of the institution that wrongfully offered you tax refunds?
1) Apple would have sold their stuff in Europe whether they had to pay full taxes or not, they only wanted a discount. I would probably not pay for the solar panels because I can't afford them.
2) Solar panels are very expensive and would make a huge dent in my balance. That's not the case for Apple.
I'm 100% sure it was known it was MD5 before, and I'm 100% sure I've seen pastebins with lots of successfully bruteforced hashes, because my password was among them.
Example: https://blog.lastpass.com/2012/06/in-case-you-missed-it-chan...