• kautau@lemmy.world
        link
        fedilink
        arrow-up
        6
        ·
        5 hours ago

        Except you’re not

        https://haveibeenpwned.com/API/v3#PwnedPasswords

        Your computer is basically sending a part of your password (the first five characters) and if the server responds positively to a match it sends all the other possible combinations and your computer looks to see if it matches the rest based on when you typed.

        For more information

        https://en.wikipedia.org/wiki/K-anonymity

        It’s always good to be cautious, but it’s especially important to know how tech works, especially good tech, when it can have immense benefit

      • JPAKx4@lemmy.blahaj.zone
        link
        fedilink
        English
        arrow-up
        12
        ·
        8 hours ago

        That is the correct way of thinking, never trust anything with your passwords.

        I was curious on what haveibeenpwned does, so I took a look at what the network tab in dev tools said what was actually sent. When I type a password (say password123) and press check it runs a function that hashes with the “SHA-1” hash function and then sends the first 5 characters of the result. The response is over a thousand lines in the format of 35 hash characters:number of breaches

        If any of these hashes are the start of your original hash, you now know it’s exposed and how many times it’s been exposed.

      • we are all@crazypeople.online
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        8 hours ago

        I wouldn’t recommend providing any current passwords, but it could be used to determine any recent/previous compromises.