Why does HIBP use k-anonymity when checking passwords?
Maybe I’m misunderstanding the purpose of k-anonymity, but I don’t see the why HIBP uses it when checking user passwords.
This website, which explains HIBP’s implementation of it, says, "The client will then truncate the hash to a pre… Continue reading Why does HIBP use k-anonymity when checking passwords?