Questions & Answers
-
1. What constitutes a "breach," and where does the data originate?
A breach occurs when data is unintentionally exposed in a vulnerable system, often due to inadequate access controls or software security weaknesses. HIBH consolidates breaches, allowing individuals to assess where their personal data may have been compromised.
-
2. Concerned about stored user passwords?
When email addresses from a breach are entered into the site, no corresponding passwords accompany them. Moreover, the Hacked Passwords service lets users check if a specific password has been compromised. Passwords are securely hashed, protecting users' personal data.
-
3. Worried about disclosing passwords to users?
The site refrains from sending passwords to individuals to minimize risks to both users and the platform. This decision is elaborated in detail in a blog post addressing password accessibility concerns.
-
4. Curious about notifications and privacy?
Notifications are sent only to monitored addresses for privacy reasons.Sensitive breaches may not be publicly searchable and require verification for access.
-
5. Wondering if a comprehensive list of email addresses is available?
The public search feature only provides results for single user-provided email addresses or usernames. Multiple breached accounts can be retrieved using the domain search feature, but authorization is required to access domain assets.
-
6. Curious about breaches where passwords aren't leaked?
Sometimes, breaches may not include credentials for online services, yet they still pose a privacy risk. Individuals affected by such breaches deserve notification to ensure their security.
-
7. How are breaches verified?
To authenticate breaches, various measures are taken, including cross-referencing with public acknowledgments, data consistency checks, and evaluating attackers' credibility and history.
-
8. What's the significance of a "paste" on the site?
A paste refers to information shared on public platforms like Pastebin. HIBH scans pastes for potential indicators of breaches, enabling users to assess if their accounts have been compromised and take appropriate actions.
-
9. Concerned about search logging?
The website doesn't log search activities explicitly, preserving user privacy.
-
10. Unsure if your email has been compromised?
HIBH contains only a subset of breached records, and many breaches go undetected or unreported. Absence of evidence here doesn't guarantee safety from breaches elsewhere.
-
11. Noticing your username or email in unexpected breaches?
Finding your username or email in unrelated breaches is possible due to shared or reused identifiers across platforms.
-
12. What about data storage practices?
Breached accounts are stored securely in Windows Azure table storage, containing only email addresses or usernames and the breached sites they appear on.