Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity
Troy Hunt
JUNE 30, 2022
Every time this very blog loads Font Awesome from Cloudflare's CDN, for example, it's verified against the hash in the integrity attribute of the script tag (view source for yourself). The 1 hash that won't yield any search results (until Google indexes this blog post.) is the middle one. And for what?
Let's personalize your content