article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

It's also a slower hashing algorithm; still totally unsuitable for storing user passwords in an online system, but it can have a hit on the consuming service if doing huge amounts of calculations. Integrity doesn't matter because there's no value in modifying the source password to forge a colliding hash.

Passwords 305
article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

As computers shrank in size, and then pervaded into our homes and everyday workplaces, passwords stuck around. Username and password logins emerged as the go-to way to control access to network servers, business applications and Internet-delivered consumer services. million on average, a potentially crippling amount.

Passwords 129
article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

Passwordless authentication offers enterprises methods for users to verify their identity without having to enter or remember textual passwords. Passwordless authentication can provide stronger security, reduce risk of breaches, and alleviate password management pressure. FIDO Authentication.