These are already leaked passwords. They stopped being sensitive and started being a security time bomb a long time ago.There's absolutely no way Troy stores passwords or potentially sensitive data of that kind. It would make him an even greater target than some of the other places that have been breached.
These are already leaked passwords. They stopped being sensitive and started being a security time bomb a long time ago.
It's one thing that the passwords are leaked. It's another when it becomes a common commodity and so accessible like it's passing candy out on Halloween.
My paranoia is with the 3rd party web site. You could send the password hashed but does he have the original password in the database along with the hash? He could determine what the hashed password is if that's the case. He's probably completely trustworthy and it would never be an issue, but you never know. I would assume that the majority of hacks had hashed passwords, but I know some didn't. In fact one of the lists has 805,499,391 email addresses with plain text password combinations according to his blog. That's a big number.You could check the sha1 hash against the API
Thanks WoodiE I will try it. I just have been really busy lately.@Fred. we now have an addon that does check new user password and existing user password changes against the HIBP v2 API thanks to @Xon here - https://xenforo.com/community/resources/password-tools.4495/
We use essential cookies to make this site work, and optional cookies to enhance your experience.