{"id":32,"date":"2019-02-03T19:03:25","date_gmt":"2019-02-03T19:03:25","guid":{"rendered":"http:\/\/passwordbits.com\/?p=32"},"modified":"2026-04-09T15:01:54","modified_gmt":"2026-04-09T15:01:54","slug":"trust-hibp","status":"publish","type":"post","link":"https:\/\/passwordbits.com\/trust-hibp\/","title":{"rendered":"Can You Trust HaveIBeenPwned?"},"content":{"rendered":"\n<p>Whenever there is a security breach, everyone likes to point to \u201cHave I Been Pwned.\u201d&nbsp;<\/p>\n\n\n\n<p>It\u2019s for a good reason.&nbsp;<\/p>\n\n\n\n<p>The guy who runs it is a \u201cRock Star\u201d in the internet security world. But that doesn\u2019t mean much to most people so let me show you why you should trust Have I Been Pwned(HIBP).&nbsp;<\/p>\n\n\n\n<p><strong>Disclosure<\/strong>: I\u2019m NOT being paid to write this. I don\u2019t know the owner of HIBP and never met him. This is just the research I\u2019ve done to find out if this site is trustworthy.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Owns HaveIBeenPwned?<\/h2>\n\n\n\n<p>Troy Hunt owns HaveIBeenPwned. <\/p>\n\n\n\n<p>Personal site: <a href=\"https:\/\/www.troyhunt.com\/\">https:\/\/www.troyhunt.com\/<\/a> <\/p>\n\n\n\n<p>Twitter: <a href=\"https:\/\/twitter.com\/troyhunt\">https:\/\/twitter.com\/troyhunt<\/a> <\/p>\n\n\n\n<p>YouTube: <a href=\"https:\/\/www.youtube.com\/user\/troyhuntdotcom\">https:\/\/www.youtube.com\/user\/troyhuntdotcom<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Is Troy Hunt?<\/h2>\n\n\n\n<p>Troy Hunt is an Australian web security expert. To learn more check out his <a href=\"https:\/\/en.wikipedia.org\/wiki\/Troy_Hunt\">Wikipedia page<\/a>.<\/p>\n\n\n\n<p>Most notable is that Microsoft awarded him \u201cMicrosoft Most Valuable Professional\u201d in 2011.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HaveIBeenPwned History<\/h2>\n\n\n\n<p>HaveIBeenPwned was created in 2013. The thing that pushed HaveIBeenPwned to life was the Adobe breach in 2013. The Adobe breach had 153 million accounts compromised.&nbsp;<\/p>\n\n\n\n<p>As Troy does, he was analyzing data breaches for patterns. He realized this data was easy for him to get ahold of, but for the average person, it was unfeasible. Troy wanted the everyday person to be able to check if their data was in a breach, so he created HaveIBeenPwned.&nbsp;<\/p>\n\n\n\n<p>HaveIBeenPwned allowed anyone to check if their email address was ever in any breaches. If it was, they could take actions to secure their accounts again. Troy also added a way to check your passwords to see if they were in any breaches too.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">HaveIBeenPwned Controversy<\/h2>\n\n\n\n<p>There was a bit of controversy for HaveIBeenPwned during the <a href=\"https:\/\/www.washingtonpost.com\/news\/the-intersect\/wp\/2015\/08\/19\/how-to-see-if-you-or-your-spouse-appear-in-the-ashley-madison-leak\/?utm_term=.414f3e66715d\">Ashely Maddison Breach<\/a>. <\/p>\n\n\n\n<p>There were sites created overnight to check to see if your email was in this breach. Since Ashely Madison was for cheating spouses, it provided an easy way to check if your partner was using the site.&nbsp;<\/p>\n\n\n\n<p>HaveIBeenPwned got wrapped up in this but did all the right things. You had to <a href=\"https:\/\/www.troyhunt.com\/ashley-madison-data-breach-q\/\">verify you owned the email address<\/a> before it would reveal if that email address was in the breach.<\/p>\n\n\n\n<p>Other sites did not do this and outed many people.&nbsp;<\/p>\n\n\n\n<p>Due to the media wanting a fast headline HaveIBeenPwned got wrapped up in this. To be clear, HaveIBeenPwned did the right thing by not exposing sensitive data of this breach. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who Uses HaveIBeenPwned<\/h2>\n\n\n\n<p>I feel it\u2019s important to point out what companies use HaveIBeenPwned. Many of these companies have a lot to lose if HaveIBeenPwned was not trustworthy.&nbsp;<\/p>\n\n\n\n<p>HaveIBeenPwned has a way for other companies to use their database to check if customers login data was compromised. This is very useful for password managers and sign-up pages.&nbsp;<\/p>\n\n\n\n<p>1Password &#8211; <a href=\"https:\/\/blog.1password.com\/finding-pwned-passwords-with\u20131password\/\">https:\/\/blog.1password.com\/finding-pwned-passwords-with\u20131password\/<\/a><\/p>\n\n\n\n<p>Bitwarden &#8211; <a href=\"https:\/\/blog.bitwarden.com\/have-you-been-pwned\u20137051d64e685b\">https:\/\/blog.bitwarden.com\/have-you-been-pwned\u20137051d64e685b<\/a><\/p>\n\n\n\n<p>FireFox Web Browser &#8211; <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/mozilla-pwned-function-firefox\/\">https:\/\/www.infosecurity-magazine.com\/news\/mozilla-pwned-function-firefox\/<\/a><\/p>\n\n\n\n<p>U.K. and Australian governments &#8211; <a href=\"https:\/\/techcrunch.com\/2018\/03\/02\/uk-and-australian-governments-now-use-have-i-been-pwned\/\">https:\/\/techcrunch.com\/2018\/03\/02\/uk-and-australian-governments-now-use-have-i-been-pwned\/<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Real People Are Saying<\/h2>\n\n\n\n<p>Being able to see what real people say about HaveIBeenPwned is worth a look at if you ask me. I\u2019ve listed off a few Reddit post that helps to back up the claim that HaveIBeenPwned is safe to use.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.reddit.com\/r\/techsupport\/comments\/42125t\/is_haveibeenpwned_a_legit_page\/\">Is haveibeenpwned a legit page?<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.reddit.com\/r\/YouShouldKnow\/comments\/8xtm7q\/ysk_haveibeenpwned_will_tell_you_if_your_email\/\">YSK: HaveIBeenPwned will tell you if your email address and passwords have ever been compromised, so change them right now if they have!<\/a> <\/p>\n\n\n\n<p><a href=\"https:\/\/www.reddit.com\/r\/privacy\/comments\/606hx5\/have_i_been_pwned_check_if_your_email_has_been\/\">Have I been pwned? Check if your email has been compromised in a data breach<\/a> &#8211; <\/p>\n\n\n\n<p><a href=\"https:\/\/www.reddit.com\/r\/privacy\/comments\/9j1ydt\/firefox_monitor_lets_you_know_when_youve_been\/\">Firefox Monitor Lets You Know When You\u2019ve Been Pwned: Mozilla teams up with Have I Been Pwned for hack-alert service.<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.reddit.com\/r\/spotify\/comments\/7mbgcl\/psa_many_spotify_accounts_emails_and_passwords\/\">PSA: Many Spotify accounts emails and passwords have been posted online in what appears to be a hack.<\/a> <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Other Sites Are Saying<\/h2>\n\n\n\n<p>Let\u2019s not forget what other sites say about HaveIBeenPwned. Spoiler: It\u2019s all good things!<\/p>\n\n\n\n<p>Digitaltrends &#8211; <a href=\"https:\/\/www.digitaltrends.com\/computing\/best-websites-for-finding-out-if-youve-been-hacked\/\">https:\/\/www.digitaltrends.com\/computing\/best-websites-for-finding-out-if-youve-been-hacked\/<\/a><\/p>\n\n\n\n<p>CNET &#8211; <a href=\"https:\/\/www.cnet.com\/how-to\/find-out-if-your-passwords-been-hacked\/\">https:\/\/www.cnet.com\/how-to\/find-out-if-your-passwords-been-hacked\/<\/a>&nbsp;<\/p>\n\n\n\n<p>dailymail.co.uk &#8211; <a href=\"https:\/\/www.dailymail.co.uk\/sciencetech\/article\u20134767562\/Have-PWNED-Site-reveals-password-safe.html\">https:\/\/www.dailymail.co.uk\/sciencetech\/article\u20134767562\/Have-PWNED-Site-reveals-password-safe.html<\/a><\/p>\n\n\n\n<p>makeuseof &#8211; <a href=\"https:\/\/www.makeuseof.com\/tag\/hacked-email-account-checking-tools-genuine-scam\/\">https:\/\/www.makeuseof.com\/tag\/hacked-email-account-checking-tools-genuine-scam\/<\/a><\/p>\n\n\n\n<p>Forbes &#8211; <a href=\"https:\/\/www.forbes.com\/sites\/adamtanner\/2014\/04\/14\/these-sites-tell-which-of-your-accounts-have-been-hacked\/#50d20e403763\">https:\/\/www.forbes.com\/sites\/adamtanner\/2014\/04\/14\/these-sites-tell-which-of-your-accounts-have-been-hacked\/#50d20e403763<\/a><\/p>\n\n\n\n<p>PCWorld &#8211; <a href=\"https:\/\/www.pcworld.com\/article\/2070080\/new-website-lets-users-check-if-their-online-credentials-were-exposed-in-large-data-leaks.html\">https:\/\/www.pcworld.com\/article\/2070080\/new-website-lets-users-check-if-their-online-credentials-were-exposed-in-large-data-leaks.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does HaveIBeenPwned Make Money?<\/h2>\n\n\n\n<p>The old saying goes, \u201cif you\u2019re not paying for it, then you\u2019re the product.\u201d&nbsp;So how does HaveIBeenPwned make money? <\/p>\n\n\n\n<p>The first way HaveIBeenPwned makes money is from donations. If you used his service in the past, please consider <a href=\"https:\/\/haveibeenpwned.com\/Donate\">donating<\/a> as it does help. <\/p>\n\n\n\n<p>HaveIBeenPwned also has a <a href=\"https:\/\/www.troyhunt.com\/have-i-been-pwned-is-now-partnering-with\u20131password\/\">partnership<\/a> with 1Password. <\/p>\n\n\n\n<p>1Password is a password manager, and it makes perfect sense to partner with HaveIBeenPwned. Troy Hunt says he used 1Password years before they ever became a partner. <\/p>\n\n\n\n<p>It&#8217;s smart to partner with a password manager because it\u2019s the next step to take after finding out you\u2019ve been in a breach.&nbsp;<\/p>\n\n\n\n<p>I\u2019m not aware of any other ways HaveIBeenPwned makes money. I know many people may be thinking that they\u2019ll sell the information inside the database. While at first, that would seem like a great idea it\u2019s not. The data that HaveIBeenPwned gets is already in the public domain anyway so anyone can grab it and do whatever they want with it. No need to sell data if you can get it free somewhere else.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whenever there is a security breach, everyone likes to point to \u201cHave I Been Pwned.\u201d&nbsp; It\u2019s for a good reason.&nbsp; The guy who runs it is a \u201cRock Star\u201d in the internet security world. But that doesn\u2019t mean much to most people so let me show you why you should trust Have I Been Pwned(HIBP).&nbsp; &#8230; <\/p>\n<p class=\"read-more-container\"><a title=\"Can You Trust HaveIBeenPwned?\" class=\"read-more button\" href=\"https:\/\/passwordbits.com\/trust-hibp\/#more-32\" aria-label=\"Read more about Can You Trust HaveIBeenPwned?\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":59,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-32","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-computer-security"],"_links":{"self":[{"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/posts\/32","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/comments?post=32"}],"version-history":[{"count":4,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/posts\/32\/revisions"}],"predecessor-version":[{"id":61,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/posts\/32\/revisions\/61"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/media\/59"}],"wp:attachment":[{"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/media?parent=32"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/categories?post=32"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/passwordbits.com\/wp-json\/wp\/v2\/tags?post=32"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}