Have I Been Pwned 2.0
Design, Aesthetics & Trust
- Many note the new dark, gradient-heavy style as part of a wider “Linear/Stripe/Tailwind” design trend; some call it slick, others “unreadable” if it ignores system dark/light preferences.
- Several users say the redesign feels less trustworthy, like a generic template or “cheap gradients,” making them briefly wonder if they’re on a phishing clone.
- Complaints about excessive vertical scrolling, “doomscroll” vibe, and poor performance (especially on phones/older GPUs). Multiple suggestions to compress card spacing and typography.
Timeline Ordering & Bugs
- Multiple reports that breach timelines are out of chronological order; users speculate it’s mixing “breach date” and “disclosure/published date.”
- Some users see breaches from companies they don’t recognize or even from before a domain was registered, raising questions about accuracy and misattributed or typo’d emails.
- Various minor issues: 401 errors in console, search box not working or disappearing, back button losing results, pastebin entries not clickable for some users.
Security, Powerlessness & Practical Defenses
- The scrolling breach history is described as “delightfully horrifying” and can make people feel powerless; others respond that tools like this are to prompt action, not fatalism.
- Recommended mitigations: unique passwords, password managers, MFA, minimizing shared PII, using fake DOBs where legal, virtual/one-use card numbers, and email aliases or catch-all domains.
- Some push back that even perfect password hygiene doesn’t protect leaked physical addresses or other PII.
Password Storage, Logging & Protocols
- Shock that major sites still had unsalted/weakly-hashed passwords; explanations center on tech debt, legacy systems, sloppy logging that captures plaintext passwords, and weak internal security culture.
- Discussion of better architectures: encrypting password fields with per-session public keys, SRP/PAKE-style protocols, and automated “canary” accounts plus secret-scanning to detect leaks.
- Disagreement over how much large companies can reasonably be expected to do vs. organizational dysfunction and middle-management incentives.
Legal, Regulatory & Incentive Debates
- One thread argues HIBP should partner with class-action firms and payouts, or fines, should hurt enough that breaches stop being “cost of doing business.”
- Others warn that heavy automatic litigation could discourage disclosure and push companies back to “deny, deny, deny.”
- Contrast between US class actions (small payouts, questionable deterrence) and EU-style large regulatory fines; debate over fines as revenue streams and their perverse incentives.
HIBP Features, Trade-offs & OSINT Concerns
- Domain search and catch-all setups: individuals with many aliases feel squeezed by the paid domain tiers; some pay briefly to pull a report, others want a cheaper “single-person domain” tier.
- Opt-out options are discussed in detail (hide from public search, delete breach list, or delete entirely), with a side concern about what happens if the opt-out list itself is breached (noted that emails are stored hashed).
- Removal of phone/username search from the UI is lamented, especially where lawsuits used it to identify affected Facebook users; the API still supports it.
- Several users explicitly say HIBP is valuable for OSINT: attackers and researchers can quickly learn which breach dumps to look up for a target. Others argue bad actors already have the dumps, and the net benefit to regular users outweighs this.
- Some users are uncomfortable that anyone can see which dubious sites appear alongside their email; opt-out is suggested as mitigation.
Password Managers & Sponsorship
- Many view funneling mainstream users from HIBP to a password manager as a major net positive.
- Debate over 1Password sponsorship vs. recommending free/open-source options (e.g., Bitwarden, self-hosting). Points raised: cost, open source vs proprietary, E2EE architectures, and trust after past password-manager breaches.
Access Controls & Captchas
- Cloudflare/Turnstile and similar bot defenses are criticized for increasingly locking out a “single-digit percentage” of real users, especially with privacy tools or certain IP ranges.
- Some report being blocked or heavily captcha’d by other services (e.g., search engines, Slack) and see this as a growing barrier to full participation online.