Two billion email addresses were exposed

Password logins, passkeys, and missing standards

  • Commenters lament that despite endless breaches, there’s still no standard way for password managers to auto‑rotate passwords across sites.
  • Some argue that if such a standard existed, it would be easier to just move fully to passkeys; others note passkeys are opaque, hard to explain, device‑tied, and not backwards‑compatible.
  • Frustration that HTTP auth never evolved into a modern, user‑friendly, secure standard; passkeys partly solve things but don’t help with legacy logins.

Email aliases, vanity domains, and HIBP friction

  • Many use per‑site/vanity addresses and catch‑all domains to track leaks and spam origination.
  • A recurring complaint: domain search in the service becomes paid once you cross ~10 breached addresses, making it expensive for heavy‑alias users to see which addresses were hit.
  • Some see value in per‑site addresses for attribution and spam control; others note practical annoyances (replying from aliases, services rejecting “+” emails, vendor lock‑in with Apple’s “Hide My Email”).

How bad is an exposed email address?

  • Some see email as essentially public (like an IP or phone number) and think the real risk is passwords and other PII.
  • Others stress that email is the key identifier tying you into breaches: once combined with weak/reused passwords or “stealer logs,” it enables account takeover, targeted phishing, impersonation and scams.
  • Stories are shared of old domains lapsing and being re‑registered to hijack accounts, and of credential stuffing against high‑value accounts.

Mitigation habits and breach fatigue

  • Many report using unique per‑site passwords via managers (Bitwarden, 1Password, KeePass, Proton Pass, etc.) plus 2FA, sometimes also per‑site email aliases.
  • Several say they now assume all their data is leaked and focus on: strong unique passwords, 2FA, credit freezes, and not sharing real addresses/phone numbers unless legally required.
  • There’s widespread cynicism: repeated breaches, minimal corporate or regulatory consequences, and “too many accounts” make people numb to new leak headlines.

Critiques and defenses of Have I Been Pwned

  • Positive: the service drives awareness, underpins password‑checking features in managers, and exposes the scale of credential‑stuffing datasets.
  • Negative:
    • Aggregate dumps like this one don’t reveal which site or password was compromised, leaving users with “you’re at risk” but no clear action beyond generic hygiene.
    • Domain search/paywall behavior around high‑volume aliases feels like upselling to some.
  • Defenders note the service intentionally doesn’t store email–password linkages, only separate email and password datasets, to avoid becoming a prime target; users are expected to bulk‑check passwords via password‑manager integrations or the password API.

Scale and infrastructure discussion

  • Some question the choice of Azure SQL Hyperscale and multi‑week processing, suggesting simpler, cheaper designs (sorted binary hash files on object storage).
  • A maintainer responds that most heavy lifting is done by custom CLI tools; SQL was chosen for operational familiarity and backup/restore guarantees, not raw speed, and future large imports should be faster with new tooling.