Breach checker
Email lookups go to HaveIBeenPwned. Password lookups use k-anonymity — only the first 5 chars of the SHA-1 hash are sent.
Email lookups go to HaveIBeenPwned. Password lookups use k-anonymity — only the first 5 chars of the SHA-1 hash are sent.