Remove Consumer Services Remove Identity Theft Remove Manufacturing Remove Password Management
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

However, what if you could manufacture a hash collision? It's also a slower hashing algorithm; still totally unsuitable for storing user passwords in an online system, but it can have a hit on the consuming service if doing huge amounts of calculations. And for what?

Passwords 308