Remove Consumer Services Remove Definition Remove IT Remove Tips
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password. It works beautifully; it's ridiculously fast, efficient and above all, anonymous.

Passwords 123