article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

SHA-1 is Just Fine for k-Anonymity Let's begin with the actual problem SHA-1 presents. More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password.

Passwords 122
article thumbnail

The race for corporate banks to catch up with their retail peers

CGI

Over the last few years, there has been a big drive to digitize the retail bank; and, of course, across Europe, all banks have had to make their data available to third parties that offer bank consumer services in response to PSD2 and open banking. Their mind-set is changing.

Retail 68
article thumbnail

In Praise of the Invisible DB2 for z/OS System

Robert's Db2

ADO.NET is another example. What is consequential to developers who want data-as-a-service capability is consistency and ease of use, and those concerns have much to do with the rapid rise of REST as a means of invoking programmatically-consumable services. These interfaces are enabled by drivers.