Remove downloading-pwned-passwords-hashes-with-the-hibp-downloader
article thumbnail

How I Got Pwned by My Cloud Costs

Troy Hunt

I have been, and still remain, a massive proponent of "the cloud" I built Have I Been Pwned (HIBP) as a cloud-first service that took advantage of modern cloud paradigms such as Azure Table Storage to massively drive down costs at crazy levels of performance I never could have achieved before. Something else?

Passwords 363
article thumbnail

Enhancing Pwned Passwords Privacy with Padding

Troy Hunt

Since launching version 2 of Pwned Passwords with the k-anonymity model just over 2 years ago now, the thing has really gone nuts (read that blog post for background otherwise nothing from here on will make much sense). They could be searching for any password whose SHA-1 hash begins with those characters. Very slick!

Passwords 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pwned Passwords, Version 5

Troy Hunt

Almost 2 years ago to the day, I wrote about Passwords Evolved: Authentication Guidance for the Modern Era. Shortly after that blog post I launched Pwned Passwords with 306M passwords from previous breach corpuses. 3,768,890 passwords.

Passwords 234
article thumbnail

Home Assistant, Pwned Passwords and Security Misconceptions

Troy Hunt

Two of my favourite things these days are Have I Been Pwned and Home Assistant. Pwned Passwords is a repository of 613M passwords exposed in previous data breaches, which makes them very poor choices for future use. So, it was with great pleasure that I saw the two integrated recently: always something.

Passwords 350
article thumbnail

Downloading Pwned Passwords Hashes with the HIBP Downloader

Troy Hunt

Just before Christmas, the promise to launch a fully open source Pwned Passwords fed with a firehose of fresh data from the FBI and NCA finally came true. The idea of taking 16^5 hash ranges, bundling them all up into a single monolithic archive then making it all downloadable seemed a non-trivial task.

Passwords 293
article thumbnail

When is a Scrape a Breach?

Troy Hunt

Someone stumbled across it, downloaded it and then sent it to me. No security controls were breached by the person who downloaded it, they simply accessed a publicly available file. The machine had full disk encryption and it's not known whether the thief was ever actually able to access the data. Is this a data breach?

article thumbnail

No, Spotify Wasn't Hacked

Troy Hunt

Very often, those addresses are accompanied by other personal information such as passwords. When an HIBP subscriber's address appears in one of these incidents, they get an automated notification and often, it seems, they then reach out to me. No, and the passwords are the very first thing that starts to give it all away.

Hacking 224