Remove tag transparency
Remove Data breaches Remove Examples Remove Exercises Remove Security
article thumbnail

I'm Open Sourcing the Have I Been Pwned Code Base

Troy Hunt

Every single byte of data that's been loaded into the system in recent years has come from someone who freely offered it in order to improve the security landscape for everyone. The very second blog post on that tag was about how I used Azure Table Storage to make it so fast and so cheap. I'm transparent about how I verify data.

Passwords 145