From troyhunt.com
![Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity](https://www.troyhunt.com/content/images/2022/06/HIBP-Banner.jpg)
Four and a half years ago now, I rolled out version 2 of HIBP’s Pwned Passwords that implemented a really cool k-anonymity model courtesy of the brains at Cloudflare. Later in 2018, I did the same thing with the email address search feature used by Mozilla, 1Password and a handful of other paying subscribers. It works beautifully; it’s ridiculously fast, efficient and above all, anonymous. Yet from time to time, I get messages along the lines of this: