No hat.sh videos yet. You could help us improve this page by suggesting one.
hat.sh might be a bit more popular than DeHashed. We know about 22 links to it since March 2021 and only 16 links to DeHashed. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
BTW you can use hat.sh website to encrypt a file with the browser on any device including phone (to decrypt you will have to visit the website) and the website runs locally on your browser so its not sending the file to any server. Source: about 1 year ago
Hey so when looking at xchacha as it seems to be getting more and more popular in terms of adoption for securing files/messages etc. I noticed that when experimenting and testing file encryption with applications like dexios picocrypt and hat.sh that none of the files could be read/understood by other applications. While this doesn't happen with alot of other apps/algos likes aes afaik. Source: about 1 year ago
I usually use hat.sh in the browser. Source: about 1 year ago
Hey so I see that the website recommends picocrypt which uses xchacha20 and its made me go on a little bit of a rabbit hole of xchacha and how it compares to aes. I've also noticed that xchacha is getting adopted very quickly; companies like google; nordpass etc are using it over aes. Does this mean aes is on its way out? Why would a person/company move a lot of their systems to this honestly brand new algorythm... Source: about 1 year ago
I second this comment. https://hat.sh is probably the easiest. Especially if you are not able/allowed to install apps on your device. Source: over 1 year ago
You can try Dehashed (Paid, only a few bucks) and Holehe (Free. If you don't want to install it, use it through epieos.com). Source: over 1 year ago
After further looking it seems similar to https://dehashed.com. Source: over 1 year ago
I'm sorry this happened to you, but don't be so surprised. Phishing and MITM attacks are alive and well, and 2-FA is just a bandaid for bad password practices. You might do well to check on dehashed.com for your own credentials. Source: over 1 year ago
2 useful resources are: dehashed.com and https://github.com/hmaverickadams/breach-parse from heath adams. Keep in mind that it is not a good idea to use these in an unethical way. Doing illegal stuff can and will get you in trouble. Source: over 1 year ago
Agree with this! Sites like Dehashed will let you search for breached usernames and have relatively cheap options for a week’s worth of access. Source: almost 2 years ago
Cryptomator - When it comes to saving your files on a cloud server, it is important to ensure the security of those files. Keeping your delicate files out of the wrong hands can save you a lot of time and hassle. Read more about Cryptomator.
have i been pwned? - Check if your account has been compromised in a data breach
VeraCrypt - VeraCrypt is a free open source disk encryption software for Windows, Mac OSX and Linux.
Snusbase - The industry leading database lookup.
Tresorit - Encrypted cloud storage for your confidential files. Using Tresorit, files are encrypted before being uploaded to the cloud. Start encrypting files for free.
LeakCheck - Data breach search engine, low price starting from $10/mo, one email address for free, unlimited API, 7B+ entries