The FBI gives the violated passwords to Have I Been Pwned

The FBI works with Have I Been Pwned and gives him the security codes he holds on the bases of and which have been leaked. Also the HIBP control service is becoming open source.

password, FBI, pwned

Have I Been Pwned (HIBP), a website created and maintained by security researcher Troy Hunt, is one of top destinations to find out if your email or password was part of a data breach.

Hunt, who is also Microsoft's regional security director, announced last night that makes the site open source so that other developers can contribute to the project and make it easier to find your compromised credentials. For the record, had announced his intention to sell it or make it available to other services.

As a first step, the Hunt Foundation and .NET are making the password module open source. The whole structure will not be done but only the password . This page that essentially allows you to check if any of your passwords were part of a data leak.

In addition, HIBP is working with the FBI, which will help strengthen the database with its own set of compromised codes.

The FBI will share the passwords as hash pairs SHA-1 and NTLM, which can then be searched for using the service or obtained as part of the Pwned Password list.

Pwned's password module allows users to download compromised passwords as SHA-1 or NTLM password lists, which can be used outside s by Windows administrators to check if they are used on their network.

Earlier this week, Hunt noted that the HIBP website is approaching 1 billion monthly requests for password and email identity leaks.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.082 registrants.
password, FBI, pwned

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).