Hi schmidthouse,
Agree with you on this one. When one once has experienced a data breach of sorts,
where log-in data (salted or not) fell into the hands of cybercriminals,
and these data get into the public domain, however well protected,
one will hesitate to go down that same route again.
Place your full trust, like all eggs in that one basket.
Later you have to live with the aftermath, threatmails, terrible amounts of spam and scam.
Just remember the data breach we had here on the forums.
Also think of the big WOT drama with the interim owner of that service,
that sold all data of contributors at that rep service to the highest bidder.
Always some service may fall into the hands of a venture capitalist, like Cambridge Analytica.
Do I have to put forward more examples of the same returning drama's we find everywhere now.
Sometimes you cannot really make out where all of your personal data may reside.
Our Dutch hospitals recently have put Big patient data into the Google Cloud.
Hospitals knew the facts, patients did not or were not informed.
Google folks do not have to know rocket-science to get these data related back to the original owners.
Do you know beforehand for whom the new EU uploadfilters will work fortunately and for whom aversely.
So when normal users check at
https://haveibeenpwned.com/ also cybercriminals may take an interest in such data,
while your surveillance state of choice and their sp**ks may also not be rather indifferent to what data and personal views you hold.
I use shodan.io for IP risk evaluation - for instance in combination with IP data I get here:
https://viz.greynoise.io/tablecombined with a
https://dazzlepod.com/ip/ remembering I may never use the found weaknesses against such an address.
Als we never could know how the hammers are going to be used now.
Just for sculpting something amazing or ruining something to utter blittereens,
I will stay rather safe than sorry and "once bitten, twice shy".
S.G.
polonus