article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

The post on the forum referenced "a collection of 2000+ dehashed databases and Combos stored by topic" and provided a directory listing of 2,890 of the files which I've reproduced here. The same anonymity model is used (neither 1Password nor HIBP ever see your actual password) and it enables bulk checking all in one go.

article thumbnail

Encryption: How It Works, Types, and the Quantum Future

eSecurity Planet

For users familiar with password management and the value of complex passwords, this makes sense. By 1999, its successor – the Transport Layer Security (TLS) protocol – offered a more robust cryptographic protocol across technical components like cipher suites, record protocol, message authentication , and handshake process.

article thumbnail

Types of Encryption, Methods & Use Cases

eSecurity Planet

Users can establish a symmetric key to share private messages through a secure channel, like a password manager. The three innovators and MIT patented the RSA algorithm, a proprietary system available through RSA Security until its public release in 2000.