General
219 results found
-
what is this someone help me
Oh no — pwned!
Pwned on 4 breached sites and found 1 paste (subscribe to search sensitive breaches)1 voteThis site is for feature requests so I’m closing this “idea” out.
See the information below the message you posted for details on which sites your email address has appeared breached on.
-
Make the bitcoin-related sites sensitive
Otherwise, users of bitcoin could be targeted in order to steal their bitcoins (as they are worth so much right now).
3 votesThe criteria I use for sensitive breaches is that the public discoverability potentially causes harm; adult websites, for example, have a social stigma.
An increased likelihood of phishing is common to all breaches and at present, I don’t feel that a site merely being financial in nature is sufficient to categorise it along with the likes of Ashley Madison.
-
Distribute large files via torrents...
subject says it all...
3 votesThis blog post explains why I didn’t use torrents: https://www.troyhunt.com/introducing-306-million-freely-downloadable-pwned-passwords/
Plus, with Cloudflare caching the file at their edge nodes, I can’t see any tangible upside to a torrent.
-
Recover latest pastes RSS feed
The latest pastes RSS feed is empty
1 voteI’ll be writing about this change in the next day, stay tuned to troyhunt.com for more
-
Can we have option to add email address in verification
It provides predefined email addresses. Can a previously verified user add another user email for verification. Also the verification process does not provide details if the email was sent successfully ( In my case it says successful but I am not receiving verification email)
1 voteAlready implemented
-
How to check if someone with complete access to my company server and all email ID's, has been stealing information?
I've recently found out that my IT person from my company has been stealing information from us. He has complete access to it's domain and server. Do you have any advice on how I can see what kind of information he has taken?
If you have any recommendations on how to find the information on his personal email ID's, that would be very helpful. Thanks1 voteThis is not a feature suggestion for HIBP
-
Provide a way for me to see the password data or other data associated with my email. Since I use unique passwords, the source is known.
Provide a way for me to find the password data or other data associated with my email. Since I use unique passwords, the source is known. I have no idea if there is valid data in Exploit.In or Anti Public Combo unless I have some more information. You may not want to host the data, but someone is doing it. I have concern over some of those sources. Knowing the password or hash would make it possible to identify the source of the problem.
1 vote -
why is the yahoo and target breaches not listed?
Why is the target and Yahoo breaches not listed
1 voteI can only load data I have! Neither of these has been circulating in trading circles.
-
Why did I receive an email indicating pwned on the JustDate fabricated breach, but when I search from the Home page, not listed?
Why did I receive an email indicating pwned on the JustDate fabricated breach, but when I search from the Home page, only the Linkedin breach is noted? Is it possible that the email was spoofed? It looks almost exactly like the one i received when you posted the Linkedin breach. I suspect many others are in this same situation. Esp. if the Justdate breach was indeed 24 million people as the email indicated. Thanks.
1 voteIt’s fully explained in the link in the email: https://www.troyhunt.com/introducing-fabricated-data-breaches-to-have-i-been-pwned/
-
use a protocol on your website that is properly supported.
In all versions of Google Chrome I am now advised;
This site can’t provide a secure connection
haveibeenpwned.com uses an unsupported protocol.
ERRSSLVERSIONORCIPHER_MISMATCHThe client and server don't support a common SSL protocol version or cipher suite. This is likely to be caused when the server needs RC4, which is no longer considered secure.
So, why can't you use a proper protocol?
1 voteI’m as close to certain as possible that this is a problem at your end, there’s been a heap of traffic through the site today and yours is the only mention of this. TLS termination is done at Cloudflare and nothing has changed configuration wise.
-
1 vote
There’s information on the FAQs page about how privacy is handled.
-
Somehow add suspected breaches
Since I use a seperate email address for every domain I register for (forum/webshops) I have a fairly good picture of breached sites (currently many forum sites). Is there a way to add/investigate/report these?
1 voteThere’s not much I can do without hard data, there are a lot of reasons why an email address unique to one site may start receiving spam and a breach is just one of them.
-
Please reconsider including leaked password in Notification Emails. Consider letting users opt in.
Your users should treat this password as public information, as should you. If you are concerned about storing this information, then delete the leaked passwords once the notification emails have been sent.
The beneficial impact of all users knowing exactly which of their passwords have been leaked is likely much greater than the dangers of your copy of the passwords being leaked since these passwords are already in the open and should be treated as public information.
If you still feel against this, then please at least make it an opt in option. Let people opt in to agreeing to…
1 voteIt’s just too risky to handle this sort of data in a publicly facing service and not be able to store it as a secure cryptographic hash. Opting in would made a large amount of additional work to service a very small portion of the overall accounts in a breach.
-
Catch all
Implement support for catch all email addresses. I use a different mail address per website I register to. Its all on the same domain that is configured to support catch all e-mail. In theory I could use an UUID email adres per website.
In order to proof you are the owner you could send a verification mail to a random mailadres for the given domain.
3 votesThis feature already exists, it’s under the “Domain search” link in the nav.
-
1 vote
I’m presently looking for the data, will certainly load it once it turns up.
Closing this out as I keep User Voice for feature suggestions.
-
Allow notifications for an entire domain or allow a way to pull the domain report without having to verify every time.
We have access to a private feed of password dumps that we query every day automatically so we can proactively notify our users of account compromises. It would be really cool if we could also query haveibeenpwned in a similar fashion without having to manually verify domain ownership each time. This would allow us to automate the retrieval of the report.
Another option would be to allow people to sign-up for domain wide notifications similar to how you allow people to sign-up for individual account notifications.
Either way, the goal is to automatically receive or retrieve the information so we…
1 vote -
Charge for the service
Good service but I think you need $ to improve it.
A user could be charged a small amount, around €1, for the release of information related to a security breach.
The basic account could be free but the user would have to pay for advanced services.1 voteI’m quite clear at this time that I don’t want to charge people for a service that does them good, nor do I want to put them at more risk by making data beyond their email address accessible over the web.
-
Notify email owner privately to limit malicious intents
I like the fact that I get to know if my email is pwned in any of the latest breaches (so opting out is not really an option), but I can see a malicious intent here as well.
Say a hacker needs to get access to my email account, then the first thing to try is your service to know if my password exists in any of the known breaches, even though I might change it but some users won't or it may be easily guessable.
My idea is, when the user enters their email address, send the results by…
41 votesI left this open for quite a while as I gave it thought, but ultimately concluded it’s not a viable approach. Here’s my thoughts in full: https://www.troyhunt.com/the-ethics-of-running-a-data-breach-search-service/
-
Esso Canada called me regarding their speedpass rewards program being compromised. Not sure if it's a one-off or more than that.
customer service said that someone accessed my account, changed the email address on file, then proceeded to order e-gift cards.
Can you check into it if possible?
1 voteNot an idea
-
Provide an email address to send you PROBLEMS with your confirmation system
I tried to set up a notification to my email, but the confirmation email you sent came in without a link (twice). I would have liked to notify you privately, but can't find any email on your site to write to privately! I use webmail on a HostGator hosted domain that I own, but the email comes in with text and a big blue banner where the link should be, but no link.
0 votesSupport question, not an idea
- Don't see your idea?