As per the NIST800-63 special publication, we are expected to prevent exposed passwords or breached passwords from being used in our applications.
Wonder if any one of us is making use of this and if yes, how?
A bit tedious for sure now that hashes.org is down, most of their solved passwords are available, according to their discord, at https://hash.lol which is really just a publicly available ipfs gateway to the files.
Yes, looks like they are down for a couple of days in a row. Not sure what happened to that useful site of theirs.
If given a choice, would you look out for other such services?
Mailwip