Remove Consumer Services Remove Mining Remove Presentation Remove Privacy
article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

SHA-1 is Just Fine for k-Anonymity Let's begin with the actual problem SHA-1 presents. More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password. And for what?

Passwords 123