Slide 22
Slide 22 text
https://blog.cloudflare.com/validating-leaked-passwords-with-k-anonymity/
{
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
5baa61f4c0b12f0a6691121c7de9420c8ff12c1f
5baa61aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
5baa61bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
5baa61cccccccccccccccccccccccccccccccccc
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
5baa61f4c0b12f0a6691121c7de9420c8ff12c1f
5baa61aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
5baa61bbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb
5baa61cccccccccccccccccccccccccccccccccc
… then do an offline check to see if the user-
supplied hash is in that breached bucket.