▲ | eterm 5 days ago | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
> Chrome told me my PureGym PIN had been compromised This is likely a false positive, if chrome is using haveibeenpwned API. e.g. A pin of 87623103 Hashes to 558B4C37F6E3FF9A5E1115C66CEF0703E3F2ADEE We get the range from HaveIBeenPwned: https://api.pwnedpasswords.com/range/558B4 And search for C37F6E3FF9A5E1115C66CEF0703E3F2ADEE And see it's "Compromised" and seen 3 times before. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
▲ | eterm 5 days ago | parent | next [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
In case anyone else was wondering, not all 8 digit pins are "compromised", although many are, and of course an 8 digit pin has limited security in any automatable scenario. To get an example that was already in the haveibeenpwned dataset, I wrote a quick script:
The "most compromised" I've seen so far is "17385382", in the DB an astonishing 119 times. It would only take a few hours to iterate through all pins and collect stats for all pins. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
▲ | qingcharles 4 days ago | parent | prev [-] | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
I had this constantly the last couple of days. I've been doing some UI mockups in Claude and it includes a password field, and either it puts in a placeholder of like 1234 or I type asdf to test the field. Then as soon as I do anything else Chrome has a fit because "my" password has (obviously) been "pwned." |