Remove Consumer Services Remove Document Remove Mining Remove Privacy
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

I mean what if you could take an existing hash for an existing document and say "I'm going to create my own document that's different but when passed through SHA-1, produces the same hash! "? My own email address begins with a "t", so it must be mine! And for what? It's a nonsense argument.

Passwords 123