General
215 results found
-
Allow a simplistic wildcard domain search on the site and the API
The only extra function I wish the API had was a very basic wildcard search of a domain (that I don't control/administer) whereby the API would simply return how many times the domain appears in your 700+ breached platforms, and on what platforms it appeared. I have no interest in knowing which email addresses appear under a domain search, just the total number of appearances of the domain and which breached platforms. DeHashed and Leak-Lookup offer this in their free search, but their API's are janky compared to yours.
1 voteHi Brendan, the clarity around it being for domains that aren't yours helps, this isn't something we'd entertain due to the privacy impact on organisations.
-
3 votes
I can only add breaches I have access to. If you have a breach you'd like to submit, please get in touch privately: https://www.troyhunt.com/contact/
-
Classify domain tiers differently
I have a personal domain and use a unique email address whenever signing up to a website, so I can easily block it if it gets leaked and starts receiving spam (it also makes it easy to know which site the leak came from). I'm only a single user but would be treated as a moderate sized company according to the new classifications.
I understand the desire to classify domains and charge different pricing for them. I also appreciate that my arrangement is somewhat unusual and that your approach no doubt works for the majority of cases, it just feels…
3 votesHi Justin, domain size is the only reliable metric we have to put a commensurate cost on the service. Check out this KB to minimise (or eliminate) the cost: https://support.haveibeenpwned.com/hc/en-au/articles/7707041970703-How-can-I-minimise-the-subscription-cost-of-domain-searches-
-
3 votes
No.
-
Domain search dashboard - Back to dashboard link
I love the new domain search dashboard! It really makes life much easier.
I would like to suggest a small addition. When monitoring several domains performing a search for one domain leads to the results for that particular domain but there is no link back to the dashboard. Would that be technically feasible?
I know that I can copy the 'Verify my email' link back into the address bar to come back to the dashboard.
Cheers,
Thomas
1 voteHey Thomas, thanks for taking the time to submit this. I'm only declining this because there's a really simple, native solution: just press the back button 🙂
-
TFN checks
Problem: Australian Tax File Number (TFN) can be used to link a fake MyGov account and claim taxes on someone's behalf.
Suggestion: Hash all leaked accessible TFN on the darknet to inform people that they should request a new one from the ATO
Context:
Today, I went to the accountant and I have become Sue0. My TFN and email has leaked from somewhere, the bad guys used the deets to create a fake MyGov account. Somehow attached their fake account to my taxes (ATO) and claimed random things to be under the 10k threshold. Apparently, I am now…4 votesThere are many problems with this:
- There are no data breached in HIBP with Australian tax fie numbers
- If there were, they're extraordinarily time consuming to parse out as they adhere to a simple numeric pattern that can't simply be regex'd out like an email address
- Hashing would provide effectively zero protection as the entire range of tax file numbers could be pre-computed very quickly due to their small number of possible values
- No anonymity means storing sensitive personal data which is definitely off the cards
And FWIW, the vast majority of data on HIBP doesn't come from "the dark web", it's being exchanged en mass via clear web forums. I appreciate this doesn't help you solve your specific problem, but unfortunately the answer doesn't lie here.
-
Please get rid of the download tool
Bit torrent was fine, Now I do not even know which version is the current one before downloading all the stuff. No delta download: So this will increase used bandwith on both sides (me and you)
3 votesThe torrent wasn't fine, it was a stagnated point in time that never evolved. If you want that then just pull down the current version and never update it again. If you want to stay current and not regularly update, then use the k-anonymity API.
And FWIW, 99.9999% of requests to the API, either directly from apps or via the downloader, are served by Cloudflare cache and have zero impact on us in terms of bandwidth.
-
Inform users of the status of incorporating new data breaches into your dataset
I'm thinking, at the moment, about the recent Twitter and Slack breaches, which I assume (but am uncertain) are not currently contained within your dataset for us to look at our data breach status. It'd be nice if you guys had some widget on the home screen that contained news, updates about data breaches currently in the process of being incorporated into your dataset.
3 votesThere's usually a very short timeframe between obtaining a data breach and having it live on HIBP. Further, when that timeframe is long enough to justify some sort of public communication, it's usually because I'm either verifying or disclosing and until both those things are done, I can't talk about it publicly. I understand the sentiment, but I can't see a viable gap in the breach load lifecycle where this makes sense.
-
complete alpha list of pwned breached sites?
alpha list of pwned breached sites & contact info.
CONSUMERS need to know if the sites they use are in a list of breached sites and how to contact the developer, webmaster to stay on them to fix it. My password keepers show some sites as breached but not on your page of listed sites (which I presume have been fixed?) How do you handle the breached sites which haven't been hardened?
2 votesHIBP only lists breaches that have been loaded into the service, it's not an index of every known incident.
-
Instagram 2023 massive hack
Ok so on January 2023 there was a massive hack on Instagram where the hacked user wants to put the unknown email on the victim's profile to "recover their spam page" , and after that, the victim gets hacked.
And also, some hacked users wanted your Bank account to recover some gift cards and instead of returning your money, the hacked one steals your money.
3 votesPlease see the description on the front of the UserVoice page:
Hi, welcome to the UserVoice for HIBP! Please keep this service focused on feature suggestions. At this time, I'm not able to service support queries. If there's a data breach you'd like added and you have access to the data, please get in touch with me privately. Posting here and asking for a breach to be added doesn't provide anything actionable and the idea will be declined and closed.
-
Better way to cancel subscription
For whatever reason, I am not receiving emails for the API Key subscription service. I have verified that noreply@haveibeenpwned.com is on the trusted senders list, is not on the blocked senders list, and have made sure the emails aren't going to junk. Unless Microsoft is blocking emails intentionally, I am not able to cancel my subscription to the API key which I no longer need (switching companies very shortly).
Please provide a better/easier way to cancel API keys.
3 votesYou’ll be blocking the mail, get in touch with me personally and I’ll sort it out for you: https://www.troyhunt.com/contact/
-
GDPR
Dear Troy,
From the GDPR standpoint, you are in total breach and anyone that is using your service on a large scale is in breach.
The reason is that GET instead of POST. You should NOT ask your users to submit emails by using GET but ONLY by using POST.
Because you are using GET, ALL email addresses remain the the Cloudflare loggers and who knows what other server loggers.
Please switch it to POST!Thank you for this kool service!
Too bad that rate limiting to 1.5 seconds does not help us to deliver a service for companies based…3 votesFrom a data protection perspective (regardless of which local regulation you choose), the issue is not GET versus POST (or any other verb), the issue is where the data passes through and if it's retained. Cloudflare logs are highly transient, as are the Azure Storage logs when the underlying data structure is queried. GET is the semantically correct verb for retrieving an entity and there are a whole bunch of reasons why it makes more sense, including being able to share a link like this: https://haveibeenpwned.com/account/test@example.com
As for the rate limit, vote on this idea, it's coming 🙂 https://haveibeenpwned.uservoice.com/forums/275398-general/suggestions/39837802-create-different-pricing-for-different-rate-limits
-
Please reconsider posting data of the Optus hack, their competency to notify us of what info has been shared we do not trust.
Please reconsider posting data of the Optus hack. The competency of Optus has been lacking and we do not trust them to notify us of what info has been shared. People who have questioned the information have received different results between contacting them and the emails sent out. Additionally, Virgin mobile whos customers were Optus, their data was included in on this hack can doubly expose users.
1 voteThe tiny fragment of publicly available Optus data won’t be loaded for the reasons explained here: https://twitter.com/troyhunt/status/1574582128385224705?s=21&t=_sEbuznYSb-sMcbWD3j68g
-
partner with other sites, for example hackcheck.io
Merge APIs, More results, More Support, Etc
3 votesNot a direction I want to entertain at this stage, other things on the cards re the objectives you list.
-
top 1 million by prevalence
I was thinking that you could help us host the database by offering top X by prevalence. One could then host the database within the enterprise. My simple test showed
470K Mar 4 04:32 10K.txt
45M Mar 4 04:31 1M.txt
9.0M Mar 4 04:46 200K.txt
16M Mar 4 04:48 345K.txt
18G Jan 21 05:42 pwned-passwords-sha1-ordered-by-count-v8.7z
The interesting part is that the prevalence dropped to below 500 at 1M records. SQLite was able to load this into a 155M database which we can easily host ourself.1 voteAs you've subsequently said, this isn't going to happen. The API is there to solve precisely the sorts of problems you're trying to address by requesting everything offline.
-
Yandex Eda etc leaks from itarmy.to
Add Yandex Eda and CDKK leaks from itarmy.to
Lots of Russian users got their addresses and other very private information revealed, including many from the opposition.
1 voteI try to keep User Voice for feature suggestions. If you have a data breach that isn't already loaded, get in touch with me privately: https://www.troyhunt.com/contact/
-
Add database of passwords longer than 8 characters
With the new NIST guideline of 8 character minimum password length, it would be useful to have a database of only passwords 8 characters or longer. My assumption is that this would reduce the size of the database significantly.
3 votesMultiple problems with this, namely that it then creates redundant copies of the same data and then where do you stop? A 10 char DB? A 13 one? But it also doesn’t matter if you’re using the k-anonymity API which I’m strongly pushing people towards, particularly because of this: https://www.troyhunt.com/pwned-passwords-open-source-in-the-dot-net-foundation-and-working-with-the-fbi/
-
Confused by Gravatar notification
You tell me that one of my accounts have been Pwned through the Gravatar scrape - but i've never used it or any of the associated companies mentioned. So how would my email even be on there? And, if it is, I can't see how it could have any personal data of mine attached. Thx
1 voteUser Voice is for feature suggestions.
Try this resource: https://www.troyhunt.com/why-am-i-in-a-data-breach-for-a-site-i-never-signed-up-for/
-
have a way to mark all "breaches" as "rectified" when you changed the pasword.
We all change our pw frequently... it's hoped,
so have a way to grade the leak to "critical" before you update the pw for that breach. but then mark it as rectified after the pw is changed
1 voteThere are no plans to make HIBP a personal triage system.
-
Clarify "<p>" within the "Title" Field of "Regler" Paste
The relevant JSON returned from https://haveibeenpwned.com/api/v3/pasteaccount/test@example.com is quoted below:
{ "Date": null, "EmailCount": 627, "Id": "https://underground-revolution.eu/hacked/networkgaming_2013_04_16.sql", "Source": "AdHocUrl", "Title": "Regler.<p>" },
Can you please clarify the inclusion of the "<p>" from "Title" field or if not needed please remove "<p>" from the "Title" field?
1 voteThis is simply the title on that paste, whoever created it added a
tag to it.
- Don't see your idea?