Termius checks the password and encryption passphrase using the haveibeenpwned.com service (HIBP). The Termius app searches for the first 5 characters of SHA-1 of the user-provided password / encryption passphrase in HIBP API per the Cloudflare k-anonymity implementation.
Termius never sends the original (unencrypted) password / encryption passphrase or information enough to discover what it is.
Example:
- The password is pa$word.
- SHA-1 of the password will be
617ADCC02712A40E76254BA1F3A26AF660F98EC7
. - The first 5 characters are SHA-1 of the password is
617AD
, the rest isCC02712A40E76254BA1F3A26AF660F98EC7
.
Here are the search results: https://api.pwnedpasswords.com/range/617AD.
...
CC02712A40E76254BA1F3A26AF660F98EC7:96
...
This data tells us the password has been leaked in 96 breaches.
77
45
Was this article helpful?
61 out of 77 found this helpful
Articles in this section
- How can I enable Split View?
- What does "Store on Device" mean in FIDO2 key generation?
- How to add ssh port forwarding commands (-L, -R, -D) to Termius
- What's the "We've sent you an email to approve the login for your IP address" error?
- How do I cancel the trial period?
- What happens when my Pro subscription expires?
- How to adjust text size?
- How can I request a refund?
- Can the mobile ('strip') keyboard be customized?
- How does Termius know a password / encryption passphrase was leaked?
Add comment
Please sign in to leave a comment.