ByteBuster Tools

Free k-Anonymity Breach Protocol

Querying massive breach databases without giving away your password.

The Problem with Checking Passwords

You want to know if your password was leaked in a past data breach. But if you type your password into a website to check, you are handing that site your password. Even if the transmission is encrypted, the receiving server learns your credential.

The k-Anonymity Solution

k-Anonymity allows you to query a massive database (like HaveIBeenPwned) while blending your request into a crowd. First, your browser hashes your password locally using SHA-1. It then takes only the first 5 characters of that 40-character hex hash and sends them to the API.

Local Resolution

The API responds with hundreds of thousands of password hash suffixes that happen to start with those same 5 characters, along with their breach counts. Your browser then performs a fast, local check to see if the remaining 35 characters of your hash exist in that downloaded list. To check k-anonymity password safe offline pwned database means the API operator learns absolutely nothing about your actual password.

Apply this concept instantly

Experience zero-server, 100% client-side execution with our free privacy-first tool:

Open Master Password Security Hub ›