+
+ In August 2017 well known security researcher Troy Hunt released a list of 306 million stolen passwords.
+ These passwords were stolen during breakins at companies like LinkedIn, Adobe and NeoPets (and many more).
+
+
+ By checking the box, Firefly III will send the SHA1 hash of your password to
+ the website of Troy Hunt
+ to see if it is on the list. This will stop you from using unsafe passwords as is recommended in the latest
+ NIST Special Publication on this subject.
+
+
But I thought SHA1 was broken?
+
+ Yes, but not in this context. As you can read on the website detailing how they broke SHA1, it is now
+ slightly easier to find a "collision": another string that results in the same SHA1-hash. It now only takes 10,000 years using a single-GPU machine.
+
+
+ This collision would not be equal to your password, nor would it be useful on (a site like) Firefly III. This application
+ does not use SHA1 for password verification. So it is safe to check this box. Your password is hashed and sent over HTTPS.
+
+
Should I check the box?
+
+ If you just generated a long, single-use password for Firefly III using some kind of password generator: no.
+
+
+ If you just entered the password you always use: Christ yes.
+
+