Breached password checker, Part 1 - Anonymize data with k-anonymity.

Not something you want to do!

So what exactly is this k-anonymity?

The returned result from the server




Software Developer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Bluetooth users beware: Hackers can track the location of your Apple & Microsoft devices

Internet Outrage Caused by Verizon Shows How Fragile the Internet Routing Is

Worldwide IT Security Spend will Reach $174.7 Billion

Adding Multi-Factor Authentication to your application

SSH operations

How to Deliver Trusted eCommerce in Just One Click

{UPDATE} 全国統一IQ 診断 テスト【脳トレ ゲーム】 Hack Free Resources Generator

HTB Stratosphere Write-Up

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Elia Bar

Elia Bar

Software Developer

More from Medium

Know-How Telephony Integrated with Zoho CRM

An integrated development environment (IDE) is a software application that provides comprehensive…

How to Use DBMS_CLOUD package to migrate data into Autonomous Database.

Deploy project on VPS using Docker