by benmarks on 6/11/19, 6:04 AM with 145 comments
by onli on 6/11/19, 9:53 AM
I'd hope Troy reconsidered the "just create a business yourself" solution. That could be structured in a way that makes sure the trust Troy earned stays linked to the project. And a bootstrapped company starting from the profitable position I assume HIBP is in now (with the business deals) does not at all have to mean more work for him. He could just offload the work he can't handle anymore to employees.
An acquisition to anyone not as trustworthy as the current solution/the candidates like Mozilla mentioned here would be a disaster mid to longterm.
by cm2187 on 6/11/19, 8:11 AM
I understand HIBP derives its value from grey-ish hats sharing with Troy any leaked dataset they find because they know him or because of his reputation.
If he leaves, it is not clear to me that his trust and reputation will stay behind with the company running HIBP. The minute HIBP ceases to be the central place for these new datasets to be shared, it ceases to be of any practical use.
by GordonS on 6/11/19, 7:40 AM
OTOH, it's kind of difficult to begrudge Troy gaining financially from HIBP, since he's spent years building it up and has helped increase security awareness for so many people.
by w8rbt on 6/11/19, 10:53 AM
We should all do away with password complexity rules (except minimum length) and simply test a large, comprehensive exposed password bloom filter for membership. It's very fast (constant time) and efficient and if the test returns no, then it's safe for a user to select that password.
Here's the code: https://github.com/w8rbt/bp
Also note that this approach satisfies the updated (June 2017) NIST 800-63-3B password vetting guidelines.
by bookofjoe on 6/11/19, 11:40 AM
by trollied on 6/11/19, 8:17 AM
by reallydontask on 6/11/19, 7:12 AM
by arkitaip on 6/11/19, 7:44 AM
by vermilingua on 6/11/19, 12:38 PM
This is possibly a step by Troy to mitigate that risk, and given his position I’m surprised he didn’t mention that at all in this post.
by OJFord on 6/11/19, 5:00 PM
Leak monitoring would be a service provided by the UNS, not falling to a volunteer, and credential revocation could be automatic and immediate.
I suppose we sort of have that bolted on with OpenID/OAuth, but that's still 'choose a provider' rather than 'this is the one way', with many servers run by different entities, but one 'system'.
by dhruvrrp on 6/11/19, 9:53 AM
Or a more independent company offering it as a standalone service, kinda like Mozilla (Monitor) or even something like Symantec (tho they seem to be bleeding money recently)
by chaitanya on 6/11/19, 9:02 AM
> I'll remain a part of HIBP. I fully intend to be part of the acquisition, that is some company gets me along with the project. HIBP's brand is intrinsically tied to mine and at present, it needs me to go along with it.
by djee on 6/11/19, 1:37 PM
by dreamcompiler on 6/11/19, 3:22 PM
by nebulous1 on 6/11/19, 9:56 AM
by Calib3r on 6/11/19, 6:29 PM
by runjake on 6/11/19, 3:09 PM
Or Oracle, or any other mega corps that buy and nerf the usefulness of the product.
by dheera on 6/11/19, 6:45 PM
by ComodoHacker on 6/11/19, 7:39 AM
by yhoiseth on 6/12/19, 7:53 PM
by therealdrag0 on 6/11/19, 4:22 PM
by elamje on 6/11/19, 7:11 AM
I hope Have I Been Pwned goes to the right people and they do an even better job at moving it forward! Kudos Troy
by twayback on 6/14/19, 12:06 PM
by ThinkBeat on 6/11/19, 1:07 PM
by pbhjpbhj on 6/11/19, 8:09 AM
He's realised he's the single point of failure, can't do it all himself, wants to balance work & family. Doesn't want the work/cost of hiring people and making a business.
So, he's preparing to sell it and there's a wishlist of what he'd like the new owner to do.
Did I get it all?
by ddffre on 6/11/19, 10:05 PM
by jedberg on 6/11/19, 9:26 AM
by giorgioz on 6/11/19, 11:34 AM
by ga-vu on 6/11/19, 10:55 AM
He did the same thing. Only instead of selling to hackers, he sold our hacked data to companies and governments.
by twayback on 6/11/19, 12:19 PM
by brightball on 6/11/19, 1:23 PM
by AngeloAnolin on 6/11/19, 4:13 PM
One option that Troy could have done is to spin up a team / small company that would continue this project - with full control and guidance under his direction. That way, the trust that he has built from everyone at the community will be carried forward as the project progresses and matures further.
This will also allow visibility and transparency knowing that the people who would be working on this project will have access to him and everyone is on board on the direction moving forward.
Lots of companies / venture capitalists would be willing to support this cause which could provide the financing the project will need to be sustained and grow further.
by skc on 6/11/19, 10:26 AM
Wonder if he couldn't just bring it in-house?
by parliament32 on 6/11/19, 4:30 PM
by sschueller on 6/11/19, 10:44 AM
EDIT: Serious question, generate hashes out of the leaked logins, store them in a blockchain and provide an interface for lookup via IPFS. Those credentials are considered burned anyway so storing them for ever in a blockchain won't matter.
Being in a blockchain anyone can access the data and use them for example on a registration page.