article thumbnail

Understanding Have I Been Pwned's Use of SHA-1 and k-Anonymity

Troy Hunt

SHA-1 is Just Fine for k-Anonymity Let's begin with the actual problem SHA-1 presents. More than a decade ago now, I wrote about how Our Password Hashing Has no Clothes and in that post, showed the massive rate at which consumer-grade hardware can calculate these hashes and consequently "crack" the password. And for what?

Passwords 133
article thumbnail

The race for corporate banks to catch up with their retail peers

CGI

Over the last few years, there has been a big drive to digitize the retail bank; and, of course, across Europe, all banks have had to make their data available to third parties that offer bank consumer services in response to PSD2 and open banking. Their mind-set is changing.

Retail 68
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

In Praise of the Invisible DB2 for z/OS System

Robert's Db2

What is consequential to developers who want data-as-a-service capability is consistency and ease of use, and those concerns have much to do with the rapid rise of REST as a means of invoking programmatically-consumable services. Getting that type of workload growth means presenting a developer-friendly environment and attitude.

article thumbnail

Data Everywhere, But Not a Drop to Drink

John Battelle's Searchblog

This is why, at present, you don’t have an AI agent doing much of anything for you, nor will you anytime soon. They may have deals with every payment, travel, and airline company on earth, but those deals don’t contemplate a novel consumer service like a flight-booking AI agent.