PrivacyMEDIUM

HIBP Update - New Passkeys and Enhanced Privacy Features

Featured image for HIBP Update - New Passkeys and Enhanced Privacy Features
THTroy Hunt·Reporting by Troy Hunt
Summary by CyberPings Editorial·AI-assisted·Reviewed by Rohit Rana
Ingested:
🎯

Basically, Have I Been Pwned added new features to help keep your data safer.

Quick Summary

Have I Been Pwned has rolled out major updates, including k-anonymity searches and automated domain verification. These changes enhance user privacy and streamline services for larger organizations. Now, users can protect their data more effectively while accessing critical breach information.

What Changed

Have I Been Pwned (HIBP) has undergone a significant transformation, evolving from a simple hobby project into a robust service used by millions. With hundreds of thousands of daily visitors and billions of compromised records processed annually, the platform is now introducing exciting new features. These updates aim to enhance user privacy and streamline operations for larger organizations.

Among the most notable changes are the introduction of k-anonymity searches and automated domain verification processes. These features are designed to protect user data while maintaining the effectiveness of the service. The new structure of subscription plans also reflects a shift to better accommodate different user needs, from small businesses to large enterprises.

How This Affects Your Data

The introduction of k-anonymity searches is a game-changer for user privacy. Previously, searching for an email address involved sending the actual email to HIBP, which could potentially expose personally identifiable information (PII). Now, users can create a SHA-1 hash of their email and only send the first six characters to the API. This means that HIBP cannot trace the search back to the original email address, enhancing confidentiality.

Additionally, the automated domain verification process simplifies how organizations can manage their domains. Previously cumbersome steps have been replaced with streamlined methods, allowing for quicker and more efficient verification. This is particularly beneficial for managed service providers (MSPs) who monitor multiple domains for their clients.

Who's Responsible

The updates come from HIBP's founder, Troy Hunt, who has been dedicated to improving the service since its inception. His focus on user privacy and data protection is evident in these new features. The revisions to the terms of service now allow MSPs to use HIBP for their customers, expanding the service's utility while ensuring compliance with privacy standards.

With these changes, HIBP is not only maintaining its commitment to user privacy but also adapting to the needs of larger organizations that require more robust tools for monitoring and protecting their domains.

How to Protect Your Privacy

To take advantage of these new features, users should consider subscribing to the appropriate plan that fits their needs. For those managing multiple domains or handling sensitive data, the Pro or High RPM tiers may be the best fit.

Additionally, organizations should implement the k-anonymity search method when querying HIBP to ensure that their users' email addresses remain confidential. By adopting these practices, users can enhance their privacy and security while utilizing HIBP's powerful resources effectively.

🔒 Pro insight: The shift to k-anonymity searches indicates a growing emphasis on privacy in breach monitoring services, setting a new standard for data protection.

Original article from

THTroy Hunt· Troy Hunt
Read Full Article

Related Pings

MEDIUMPrivacy

Inconsistent Privacy Labels - Users Left in the Dark

Data privacy labels for mobile apps are intended to inform users, but they're currently inconsistent and unclear. This leaves users unsure about how their data is being handled. It's crucial for developers to improve these labels to enhance user trust and security.

Dark Reading·
HIGHPrivacy

LinkedIn - Secretly Scans 6,000+ Chrome Extensions

LinkedIn is scanning over 6,000 Chrome extensions to collect user data, raising significant privacy concerns. This could expose sensitive information about users and their corporate affiliations. Stay informed and protect your privacy.

BleepingComputer·
MEDIUMPrivacy

Blocking Children from Social Media - A Misguided Approach

Governments are trying to protect children from social media with bans. However, these age-based restrictions may cause more privacy issues than they solve. The focus should shift to open conversations and responsible platform design.

Malwarebytes Labs·
HIGHPrivacy

WebinarTV - Secretly Recording Public Zoom Meetings

WebinarTV is recording and publishing public Zoom meetings without consent. This raises serious privacy concerns for participants. Users must be aware of their digital footprint.

Schneier on Security·
MEDIUMPrivacy

Messaging Apps - Analyzing Permissions on Android Devices

A new analysis compares Messenger, Signal, and Telegram's permission requests on Android. Telegram has the least permissions, while Messenger has the most. This impacts user privacy significantly.

Help Net Security·
MEDIUMPrivacy

Digital Trust Erosion - How Logins Impact User Confidence

Sign-up forms and login processes are causing digital trust to erode. With 68% of users reporting issues, understanding these challenges is vital for improving security and user experience. Organizations must address these concerns to build lasting trust.

Help Net Security·