[vc_row][vc_column][vc_listinghero featured_image=”4491″ headline_text=”Frequently Asked Questions” description_text=”” cta_text=”” cta_url=”” gradient_percentage=”.6″][/vc_column][/vc_row][vc_row css=”.vc_custom_1548173635536{background-color: #000000 !important;}”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_column_text]What is the breach tracker?  

Circadence launched this breach tracker to help individuals see if their email has been compromised using the Have I Been Pwned ” APIIt is designed to inform users of any vulnerabilities to their email accounts so that they may take necessary steps to secure their information on any platform or device by which their email address is utilized.   

What is a “breach” and where has the data come from? 

A “breach” is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. HIBP aggregates breaches and enables people to assess where their personal data has been exposed.
 

Are user passwords stored in this site? 

When email addresses from a data breach are loaded into the site, no corresponding passwords are loaded with them. Separately to the pwned address search feature, the Pwned Passwords service allows you to check if an individual password has previously been seen in a data breach. No password is stored next to any personally identifiable data
 

My email was not found — does that mean I haven’t been pwned? 

Whilst HIBP is kept up to date with as much data as possible, it contains but a small subset of all the records that have been breached over the years. Many breaches never result in the public release of data and indeed many breaches even go entirely undetected. “Absence of evidence is not evidence of absence” or in other words, just because your email address wasn’t found here doesn’t mean that is hasn’t been compromised in another breach. 

How is the data stored? 

The breached accounts sit in Windows Azure table storage which contains nothing more than the email address or username and a list of sites it appeared in breaches on. If you’re interested in the details, it’s all described in Working with 154 million records on Azure Table Storage – the story of Have I Been Pwned 

Still curious how the API works?  [/vc_column_text][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row]