Remove tag service-provider
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

Hashing algorithms provide an efficient means of comparing two files and establishing if their contents is the same due to the deterministic nature of the algorithm (the same input always produces the same output). For a modern day reference of how you should be storing passwords, check out OWASP's Password Storage Cheat Sheet.

Passwords 124