The mere fact of a breach means very little if the associated website or other details are not findable. (I have to admit I have no idea whether the API addresses this, but I have no idea how to use it anyway.)
HPI gives heaps of info: Affected Service Date Verified Password First and last name Date of birth Address Telephone number Credit card Bank account details Social security number IP Address
Am I missing something?
This should be emailable to the account holder in the same way, I would have thought.1 vote
There’s two important comments on this:
Firstly, HIBP describes the data classes that were exposed. If it says “email addresses and phone numbers”, for example, then your email address and phone number were almost certainly in the breach. The vast majority of the time, this is the data you gave the website.
More importantly though – and the reason for closing this as “declined” – is that it’s just too great a risk to store this information. Often the data is extremely personal and it was also often improperly secured in the first place. For example, plain text passwords, something I would never consider storing in my system.
So in short, the risks are too great and the benefits are minor given it’s data you’ve normally already provided yourself anyway.
Why is the target and Yahoo breaches not listed1 vote
I can only load data I have! Neither of these has been circulating in trading circles.
Provide a way for me to see the password data or other data associated with my email. Since I use unique passwords, the source is known.
Provide a way for me to find the password data or other data associated with my email. Since I use unique passwords, the source is known. I have no idea if there is valid data in Exploit.In or Anti Public Combo unless I have some more information. You may not want to host the data, but someone is doing it. I have concern over some of those sources. Knowing the password or hash would make it possible to identify the source of the problem.1 vote
It provides predefined email addresses. Can a previously verified user add another user email for verification. Also the verification process does not provide details if the email was sent successfully ( In my case it says successful but I am not receiving verification email)1 vote
How to check if someone with complete access to my company server and all email ID's, has been stealing information?
I've recently found out that my IT person from my company has been stealing information from us. He has complete access to it's domain and server. Do you have any advice on how I can see what kind of information he has taken?
If you have any recommendations on how to find the information on his personal email ID's, that would be very helpful. Thanks1 vote
This is not a feature suggestion for HIBP
The latest pastes RSS feed is empty1 vote
I’ll be writing about this change in the next day, stay tuned to troyhunt.com for more
Oh no — pwned!
Pwned on 4 breached sites and found 1 paste (subscribe to search sensitive breaches)1 vote
This site is for feature requests so I’m closing this “idea” out.
See the information below the message you posted for details on which sites your email address has appeared breached on.
Provide Solutions on "How To" reverse the process of compromised email address and passwords.1 vote
You cannot reverse an email address and password having been exposed, it is an immutable historic event.
The files version 1, update 1 and update 2 contains 320,3355,236 SHA1 values but only 320,294,464 are unique the difference are 40,772 values1 vote
Please use UserVoice for feature requests.
the listed date - "(1 Jan '01)" is, shall we say, an out-of-bounds error. Site didn't exist that long ago!1 vote
If the data is no longer there, I can’t tell you anything more about it as I don’t save pastes.
Cloudflare antibot on your api doesn't make any sense, i have a python discord bot with your api implemented and because of cloudflare i cant use the api anymore and i have quite a few users who use the function.1 vote
All ok but please reply to our problems sent to you via mail and twitter.......it is a great issue for most of us1 vote
This UserVoice is for suggesting new ideas. If you have an idea you’ve been trying to get in touch with me about and haven’t been able to reach me, please detail it as a new item here. Do read the other ideas here too as well as the HIBP tag on my blog in case it’s already covered there: https://www.troyhunt.com/tag/have-i-been-pwned-3f/
I don't know if this is already available, but I feel it will be a better idea.1 vote
It provides next to no security (I already have billions of addresses I could use to crack it) and it would require an entire copy of the system hence doubling up on all the storage costs.
I've changed my password but my mail remain in the list. When my account will be "pwned" again, I will not know about it.1 vote
HIBP is a reflection of which emails were breached in which systems and is not designed to track what changes are made to an account post-breach.
explain in the FAQ why a mail address (mine!) appears as hacked in your tool, but the associated password is not listed as hacked?
Does it mean that the e-mail adress was hacked, but that the associated password was not decrypted? If not, why the password is not found in your database? Thanks.1 vote
HIBP does not store passwords.
I used to lookup password hashes by a binary search in the sorted password list (iterating over the initial database and the 2 updates).
With the new database 2.0 this is no longer possible (unless I sort the downloaded hashes).
Please bring back the sorted hashes.
I do not care for the counts that have been added - perhaps another file with sorted hashes and without counts (to somewhat reduce the file size) could be offered for download?1 vote
I’m trying to avoid having multiple versions of the same thing, I suggest that if a different order is important you just do a one-off reordering of the file.
Can you describe what the intended use of the LogoType field in the Breach object is? I can't find anything in the API docs that describes the field. I know what SVG and JPG are, but to what do they refer? Do you have (or plan to have) an API that will return a logo for the name of a breach? I can see from the source of your web pages that you have that data in the content folder1 vote
This is intentionally undocumented and will be replaced by a formally documented alternative in the future.
There was no Twitter breach, they inadvertently logged passwords to an internal system and there’s no evidence they were ever obtained by an unauthorised party.
I'm getting an "Oh no catastrophic failure" message repeatedly for one password in particular - I'd like to understand what that means.
I'd like to understand what the "Oh no catastrophic failure" message actually means.1 vote
Insufficient information to reproduce
I use unique email address per subscriber, and I suddenly started receiving spam on the email I used to signup for armorgames.
They are not trustworthy. -- this is not an idea, but saw that you have listed them as unconfirmed, I can confirmed my data was leaked from their site --1 vote
It’s the combination or Armor Games and Coupon Mom together which means this breach is unverified; I can’t emphatically say which addresses are from which service.
- Don't see your idea?