Files
site/content/post/opting-out-of-haveibeenpwned.md
2025-02-16 23:14:56 -05:00

3.1 KiB

title, date, draft, comments, toc, author, tags, author
title date draft comments toc author tags author
Opting out of haveibeenpwned 2025-02-16T21:15:07-05:00 false true false Dave Gallant
breach
haveibeenpwned
hibp
privacy
darkweb
Dave Gallant

The increasing number of data breaches has become a concern for anyone trying to live a life of relative privacy. Just last month, the PowerSchool Data informed its customers that hackers stole data of 62 million students. Unless you have been practicing Extreme Privacy techniques for decades, you likely have been impacted by at least one data breach.

Understanding Data Breaches

Data breaches occur when individuals gain access to sensitive information and then share it for public consumption. This sensitive information is dumped on hacker forums and other sites that comprise the dark web.

Check if you have been impacted

There are a number of services that can be used to check if you have been impacted by any data breaches, including Mozilla monitor, Google Dark web report, and HIBP. Password managers often also offer ways to check your current credentials against known breaches. These services can also be configured to send you notifications on breaches. It is a good idea to become aware of these breaches as soon as you can, so that you can limit the blast radius of these exposures.

If you have been an email or phone number for any length of time, there is a high probability that some of your data has been exposed somewhere. You can easily check by querying HIBP. Many of the tools that offer breach detection, query this database. Although I think this is a great service (and I recommend using it), it also opens the door for anyone who may be looking to gain more information about your present and past usages of services.

Opting out

If you have an email that you'd like to protect, I'd suggest opting out of public searchability. This of course does not undo the data breach that happened, but does it make it more challenging for someone to quickly find out information about an associated email address. This does not impact the ability for you to be subscribe to breach notifications, but it does force you to validate that you have access to the email, before receiving the notifications.

Email aliases

One way to prevent future exposures is to use an email aliasing service such as Firefox Relay, DuckDuckGo Email Protection, or if you use Proton Mail, hide-my-email aliases. This will allow you sign up for services using an alias. The service then forwards all emails to your real address that you configure when setting up the alias.