#DataBreaches, #Password Security, #Privacy and Security

XposedOrNot: New Open Source Data Breach Notification

December 12, 2023
xposedornot-homepage


In a digital era where data breaches are not just a possibility but an alarming inevitability, protecting your personal information has never been more crucial.

Herein lies the birth of XposedOrNot (XON) – not as a mere tool, but as a guardian of your digital identity.

The Inception of a Forensics Fascination

My journey into the world of data breaches began with a spark of curiosity in forensics and a realization of the dangers that lurk in the vast shadows of the internet.

This path has led me to convert a personal endeavor into a 100% free public service, dedicated to empowering you to shield your privacy.

Empowerment through Knowledge

XON

With XposedOrNot, discover if your email and personal details have fallen prey to online vulnerabilities. Knowledge here is not just power—it’s protection. Here’s how we equip you:

  • Email & Personal Detail Checks: Quick searches to see if your information is at risk.
  • Domain & Sub-domain Analysis: Exclusive domain-level insights for verified owners.
  • CXO Dashboard: A panoramic view of breach impacts for businesses managing multiple domains.
Unlike other services that stop at notification, we delve deeper:
  • Risk Scoring: We don’t just inform; we assess the danger to your email.
  • Industry-Specific Insights: A breakdown of breaches by sectors, fostering awareness and preparedness.
  • Proactive Alerts: 100% Free alerts for your domains to stay ahead of threats.
  • Free XposedOrNot API: Seamlessly integrate our data into your applications, enhancing your cybersecurity measures without any charge.
  • Open Source Repository: Your expertise can strengthen our collective shield. Contribute on GitHub!

Join the Crusade Against Data Breaches

Your expertise matters. Join hands with us, and let’s evolve XposedOrNot together—making it the beacon for digital safety it’s destined to be. We stand at the threshold of a new frontier in personal data protection. With XposedOrNot, you’re not just informed—you’re forearmed.

As I launch XposedOrNot, our repository is robust, starting with little less than 500 data breaches encompassing over 8 billion records. This significant foundation ensures that from your first visit, you can receive comprehensive insights into your digital safety. But my commitment doesn’t end there.

In the next few weeks, I am ready to scale this further—with additional breaches lined up, ready to be integrated into our platform.

This imminent expansion will enrich XposedOrNot’s database, reinforcing our dedication to providing you with the most up-to-date and expansive breach notification service available. Let’s embark on this journey towards a safer digital tomorrow. As we embark on this journey with XposedOrNot, let’s navigate the tangible benefits it offers.
Here’s what sets XposedOrNot apart, and how it stands as your digital sentinel:

-> Open Source and Powerful Integration

XposedOrNot isn’t just a tool; it’s a movement. Entire source code hosted on GitHub and crafted with the finesse of Linux and Python, our platform is a testament to transparency and collective development. We harness the colossal might of Google Infrastructure alongside Cloudflare’s steadfast security to deliver a service that’s robust, responsive, and reliable.

-> Unfettered Access to Data Analytics

Step into a world where information is not behind a paywall. XposedOrNot offers unlimited API queries, enabling you to weave our capabilities into your digital fabric, free of charge. I am committed to equipping you with the power of data without a price tag.

-> Insightful Analytics and Visualization

Dive into a rich, interactive landscape of breach analytics with XposedOrNot. Graphical representations paint a vivid picture of your cybersecurity posture, while detailed reports on password strength and breach timelines offer a narrative of your digital vulnerabilities. It’s not just data—it’s understanding.

-> A Portal Through Time

With XposedOrNot, you gain the ability to track the trajectory of data breaches. This chronological insight is your foresight, equipping you to comprehend and combat the evolving threats in the cyber landscape.

-> Domain-Specific Intelligence

If you’re managing a domain, we elevate your oversight with domain-level summaries. It’s not just about identifying threats—it’s about understanding them within the context of your digital ecosystem. Together, we bolster the fortitude of the internet.

-> Privacy Guard

We pledge to protect not just your data, but also your discretion. Our Privacy Guard ensures that you can shield your email from public searches while still staying updated on pertinent breach information. XposedOrNot isn’t just about being secure; it’s about being privately secure.

-> Collaborative Excellence

Your contributions are our milestones.

By sharing your data and code, you join our Hall of Fame—a cadre of guardians shaping a safer internet. Your insights amplify our collective strength, fortifying our shared digital frontier.

-> Your Voice Matters

Every suggestion, every piece of feedback is the currency we value. Share your thoughts, feature requests, or issues directly on GitHub. My commitment is to refine XposedOrNot into a tool that’s not only secure but also shaped by its users.

-> The Future Unfolds

XposedOrNot is not static; we evolve. Our roadmap is as open as our source code, paving the way for enhancements like multi-channel alerts, VIP user monitoring, an enriched CXO dashboard, multi-language support, and more. With XposedOrNot, the future is not just bright; it’s secure. Stay connected, stay informed, and above all, stay #XposedOrNot safe.

Proactive Protection with Alert Me

In the digital universe, your email is not just an address; it’s the key to your online identity, connecting you to the myriad of services you rely on daily. Recognizing the heightened need to safeguard this digital key, especially your most prized email accounts linked to banking and personal services, we introduce the ‘Alert Me‘ feature from XposedOrNot.

Seamless Security with Email Verification

Our approach to security is straightforward: verify to protect. ‘Email verification‘ with us goes beyond the norm—it establishes the surety that the rightful owner is alerted. When your verified email surfaces in any new data breach, XposedOrNot is ready to notify you, ensuring you are always one step ahead of potential risks.

Effortless Enrollment for Alert Me

xon-results-red
Signing up for ‘Alert Me‘ is as simple as it gets. A quick search for your email on our platform leads you to the opportunity to engage this protective feature. With just a single click and a simple confirmation process, which includes an automated email to validate your request, you set up a robust alert system tailored just for you.
xon-results-green
Once verified, ‘Alert Me’ brings you an array of personalized insights:
  • Year-by-Year Analysis: Trace the timeline of breaches and their impact on your data, year after year.
  • Risk Score: Gain perspective with a score reflecting your email’s vulnerability, derived from historical breach data.
  • In-depth Breach Insights: Go beyond the surface with detailed reports on each breach incident, including the scope and nature of the exposed data.
  • Data Exposure by Categories: Our unique categorization into six pillars offers clarity on which aspects of your personal data are most at risk.
  • Password Exposure Analysis: Assess the security of your passwords, understand past exposures, and learn how to fortify them.
  • Industry-Wise Breakdown: Identify the breach hotspots within your industry, enabling you to benchmark and strengthen your data protection strategies.
  • Sensitive Data Breaches: Breaches which are expected to contain sensitive data that might have an impact on the user
Alert Me‘ is more than a notification service—it’s your personal sentinel in the ever-evolving landscape of cyber threats. With XposedOrNot, you’re not just reacting to breaches; you’re preparing for them. Building upon the foundation of trust and transparency we’ve established with XposedOrNot, let’s delve into the analytical prowess and domain-specific capabilities that set us apart:

Elevating Insights with Data Breach Analytics

analytics-1
Our commitment to empowering you with knowledge is encapsulated in our in depth-insights. We delve into the data, extracting critical insights such as the year of exposure, password storage practices, and industry-specific trends. These analytics aren’t just numbers; they’re a compass for navigating the murky waters of cyber vulnerabilities, guiding you towards informed corrective actions.

Responsive to Your Analytical Needs

The landscape of data breaches is as varied as it is vast. We recognize the need to tailor our analytics to serve you better. Your feedback is the beacon that guides our expansion. Engage with us, share your insights, and watch as we evolve our analytics to spotlight the areas you deem most crucial. Your input is the catalyst for our growth.

Domain Search: Broad Scope, Precise Insights

When it comes to data, size matters—and we’re dealing with vast quantities. That’s why we’ve fine-tuned our capabilities to enable searches at the domain and subdomain levels. Whether it’s example.com or any other domain, our domain search feature provides a high-level summary at a glance, respecting the fine balance between open access and privacy, presenting only the essential data, nothing more.

Empowering Domain Owners with Verification

For those holding the reins to a domain, our domain verification process is the key to unlocking a detailed view of your domain’s security landscape. This easy three-step verification doesn’t just confirm authenticity; it opens the door to a comprehensive analysis of email and breach data, exclusive to verified domain authorities. XposedOrNot is not just a tool; it’s your strategic partner in the digital realm, offering unmatched clarity and control over your online presence. As we continue to chart the course through the robust offerings of XposedOrNot, let’s turn our attention to a feature designed for the strategic decision-makers: The Exclusive CXO Dashboard.

Empowering Leadership with The CXO Dashboard

xon-dashboard
Imagine the insights at your command when you can scrutinize an entire domain or subdomain for data breaches. Our NoSQL database lays the groundwork for this power, serving up the data you need with simplicity and speed. For those who steer the ship—domain owners, SOC team members, InfoSec community, CERT/CSIRT personnel and authoritative figures—we’ve streamlined the path to clarity with a straightforward  and simple 3-step verification process. It’s about granting you the keys to unlock a treasure trove of breach data pertinent to your domain’s email addresses.
dashboard-2

Tailored Verification Methods: Your Choice, Your Convenience

Choose from three bespoke verification methods to authenticate your domain and tap into the CXO Dashboard:
  • DNS Verification: It’s akin to an exclusive passcode, a unique record in your DNS settings confirming your domain’s authenticity.
  • HTML Verification: Place a unique code within your website’s root directory, like planting a flag on your digital territory.
  • Email Verification: Receive a direct verification link in your inbox for a one-click confirmation of your domain’s authority.
Once verified, you’ll gain a panoramic view of data breach incidents across your domain. The CXO Dashboard is your command center:
  • Unified Metrics for Domains: Consolidate data across all your domains into a single, comprehensive dashboard for a clear, strategic overview.
  • Export & Act: The dashboard is not just for display; export metrics for proactive incident response and risk management.

Ready to take charge of your digital safety?

Visit xposedornot.com now to check your exposure to data breaches and start protecting your digital identity today.

Domains API Management & Integration: A 5-Star Experience

api-key-management
Harness the full potential of the CXO Dashboard through our API:
  • Seamless Data Fetch: Utilize our RESTful API to retrieve pertinent data efficiently, with JSON-encoded responses that are the epitome of HTTP protocol standards.
  • User-Friendly Testing Environment: Our API Playground invites you to familiarize yourself with the XposedOrNot API’s capabilities in a risk-free environment.
  • Email Data Breach Investigations: Deep-dive into an email’s breach history, informing your security posture with essential historical data.
  • Domain-Specific Data Breach Queries: Access a comprehensive view of your domain’s breach status with our dedicated endpoint, requiring API key authorization for enhanced security.
  • Easy Integration: The clear architecture and JSON responses ensure that integrating the API with your internal security tools or applications is effortless, enhancing your cybersecurity landscape.
With these tools at your disposal, the CXO Dashboard transcends its role as an analytical tool to become an integral part of your information security arsenal, providing insights that are as actionable as they are essential.
Navigating further through the offerings of XposedOrNot, we arrive at the crucial juncture of privacy. The integrity of your personal information is our utmost priority, hence the inception of the Privacy-Shield.

The Essence of Privacy: Introducing Privacy-Shield

In a world where data is as precious as it is vulnerable, the question arises: should any and all email addresses be subject to public searches? Our answer, crafted with the utmost respect for individual privacy, is the Privacy Shield.
privacyshield

Your Email, Under Your Control

With XposedOrNot’s Privacy Shield, you hold the reins. This feature enables you to block your email address from public searches, placing the control squarely in your hands. Activate Privacy Shield with a simple verification process, and rest assured that your email exposure is sealed away from public scrutiny.

A Balanced Approach to Alert and Protect

Even with Privacy Shield in place, vigilance remains key. Thus, emails safeguarded by Privacy Shield still benefit from the ‘Alert Me‘ feature, offering a protective layer that informs you of any breach involvement while maintaining privacy.

Transparency in Exposed Data Breaches:

xposed
The Xposed data breaches page stands as a testament to our commitment to transparency. It’s a beacon for those seeking clarity on the scope of data breaches. This page is the repository, the collective memory of breaches, updated in real-time for absolute transparency. It empowers you with information, ensuring that the data stored within XposedOrNot is an open book, yet one that only you can read about your email.

A Comprehensive Resource for the Informed User

breaches-visualisation
XposedOrNot goes beyond mere notification; it offers an in-depth look at the breaches themselves, furnishing you with details on the nature and extent of each incident. Knowledge is not only power—it’s also protection, and with the insights from the Xposed data page, you are equipped to understand and respond to the evolving threats in the digital landscape. As we peel back the layers of XposedOrNot, the technological backbone that powers our platform comes to the forefront. It’s this fusion of robust architecture and user-friendly design that enables us to serve you effectively.

Technical Architecture

architecture-new

Harnessing Google's NoSQL Datastore

Our choice to utilize Google Datastore’s NoSQL database is anchored in its scalability and reliability. It effortlessly manages sharding and replication, adapting to our growing needs without missing a beat. For those familiar with the tribulations of querying vast databases, this environment is a breath of fresh air—capable of handling hundreds of millions of records without the typical management headaches.

Simplicity Meets Elegance in Front-End Design

On the front-end, I’ve embraced simplicity without sacrificing functionality. Bootstrap and JQuery provide a sleek, intuitive user interface that belies the complexity of the data it represents. These tools were chosen for their ease of use and ability to deliver a robust experience without the need for advanced web development skills.

A Solid Foundation with Nginx and Ubuntu

The steady pulse of XposedOrNot started with an Nginx server running on the reliable Ubuntu operating system—a personal favorite of mine that has proven its worth. Now the entire process of hosting the front end is supported by Cloudflare Pages.

API is run completely on top of Google infrastructure using Cloud Run.  With the added muscle of Google Cloud’s scalable infrastructure, we’ve built a tech stack that is both sturdy and nimble, ready to evolve with the demands of our service.

Shielded by Cloudflare

Our armor against the wilds of the internet is forged by Cloudflare’s Web Application Firewall (WAF) capabilities. While my design philosophy has always been ‘security by design‘ and ‘defense in depth‘, I don’t shy away from adding robust external protections. Should the walls ever be breached, our design ensures that exposure is minimal—no plain text passwords, no sensitive details, just the email addresses caught in the breaches.
The full scope of our security measures and data handling practices is transparently laid out in our FAQ.

The Manual Art of Data Collection

Contrary to what one might expect in this age of automation, our data collection process remains entirely manual. There’s a reason for this—the nuances of data breach records require a human touch.

Taming the Data Deluge with Python

Data parsing is where the real challenge lies. The diversity in data forms—from SQL dumps to JSON, from raw texts to disorganized data clumps—is staggering. Each data breach record has its quirks, its unique format, and storage style. Here’s where my tailored Python scripts come into play, meticulously written to sort, sift, and organize this jumble of information. Python’s versatility and its rich library ecosystem have made it possible to code these complex parsing activities efficiently. Through this journey, Python has not just been a tool; it’s become an extension of my own problem-solving, earning my profound appreciation. In essence, the technology and architecture behind XposedOrNot are as much about strength as they are about finesse—ensuring that we deliver a service that’s as secure and reliable as it is user-friendly. As we further unravel the capabilities of XposedOrNot, we arrive at a pivotal service feature—the free API, which epitomizes our commitment to accessibility and utility.

Unleashing Potential with XposedOrNot API

api-playground
Our data’s value is not merely in its collection but in its accessibility and utility. The API, crafted with the help of Python Flask, is the bridge between XposedOrNot’s vast database holding billions of exposed breach records and your personal or professional applications. It’s designed to be intuitive, a seamless conduit for querying data or integrating it with your own platforms with minimal effort. The intricacies of these API routes are meticulously detailed in our API-docs for your convenience.

Expanding Horizons with Flask

Building upon the time-tested stability of the Xposed Passwords serving since 2018, I’ve broadened the API to encompass email searches and associated functionalities. This expansion is grounded in the robustness and knowledge acquired over five-plus years of operating with Google Cloud’s Datastore. The agility and performance of this infrastructure reinforce the API’s capability to serve your needs.

A Playground for Innovation

I strongly encourage you to experiment and explore with our API Playground. This space is crafted for you to test and understand the API’s functionalities before you commit them to your projects.

Our Pledge: Free Access for All

Our ethos is clear: the XposedOrNot API will remain free. This promise extends to every aspect of our service—from the individual using the website to the developer integrating the API into their systems.

A Call to Collective Vigilance

We stand at a crossroads in the digital age where awareness of data breaches is crucial. XposedOrNot isn’t just a tool; it’s a community service, a beacon for those who seek to bolster their online security and privacy. Together, let’s illuminate the shadows where data breaches lurk and fortify our digital lives. Continuing our journey through the heart of XposedOrNot, let’s explore the open-source nature of the platform and the security enhancements that underscore its robust architecture.

Embracing Open Source: A Leap of Faith

The decision to open source XposedOrNot’s API and related HTML code was not taken lightly. Despite the trepidation that comes with sharing one’s code with the world, especially as a nascent developer, the philosophy of open source prevails—driven by a commitment to collective improvement and knowledge sharing. Thus, the entire codebase resides on GitHub, a testament to our belief in transparency and collaboration.

Join the Collaborative Endeavor

Our XposedOrNot GitHub repository is more than just a codebase; it’s a collaborative space. Whether it’s suggestions, bug reports, or feature enhancements, your contributions are invaluable. As we navigate through this open-source journey together, I welcome your experience, expertise and patience.

The Evolution of Security Through Coding

Python has been an illuminator in the realm of elegant coding practices. The transition from Python 2 to Python 3, though unexpected, served as an enriching chapter in the XposedOrNot story. This shift not only aligned with the latest Python standards but also reinforced the long-term viability of our API.

Security: The Cornerstone of Our Code

The defense-in-depth principle is our guiding star for security. Meticulous attention to Python’s security capabilities has been a priority, ensuring that every line of code contributes to the safety and security of our API.

Tooling Up for Code Excellence

  • Pylint: This stringent ally scrutinizes our code for adherence to conventions and best practices. It’s been instrumental in refining our code, pushing us closer to the zenith of coding standards.
  • Bandit: Contrary to its name, Bandit is a guardian, rigorously scanning for security vulnerabilities within our Python code. Passing the Bandit test was a milestone, affirming the security of our codebase.
  • Black: In the realm of code formatting, Black takes the reins, ensuring that our code is not just functional but formatted to perfection—a critical step given the open-source nature of our API.
By opening this code to the world, I invite you to be part of our mission to secure online data. With tools like Pylint, Bandit, and Black as our companions, we’re continually refining XposedOrNot, aspiring for a level of security and coding excellence that we can all be proud of. As we delve into the performance metrics of XposedOrNot, it’s clear that speed is of the essence. Let’s dissect the testing that sheds light on the efficiency of both the web interface and the API.

API Speed: Fast, Secure, and Responsive

When it comes to the API, Cloudflare steps in to bolster security and enhance speed with caching. The result is a staggering 90% of responses clocking in at under 100 milliseconds. For an API tasked with handling sensitive data breach information, such responsiveness is not just impressive—it’s crucial. With XposedOrNot now fully operational, expanding email search capabilities and a growing database of breach information, we stand at the cusp of continual evolution. The road ahead is bustling with the promise of new data, features, and tools.

Gratitude for Collective Support

The project has reached this juncture thanks to a myriad of supporters—both seen and unseen. Their contributions to the data breaches reported on XposedOrNot have been invaluable, and my gratitude to them is boundless.

Anticipating New Horizons

In the forthcoming weeks, the repository will be augmented with historical breach data, enriching the resources available to our users. Additionally, a new sub-project is on the horizon, one that I am particularly enthused about. It promises to serve a broader audience and add another dimension to the XposedOrNot experience. Stay tuned to [xonPlus] for updates on this exciting development.

🎉 Not only have I poured my heart into creating this amazing new tool, but I’ve also listened to your feedback and made some awesome enhancements. To ensure everyone can benefit from it to the fullest, I’m excited to announce that we now support the top 10 languages – whether you want to interact in English, Spanish, or Mandarin, we’ve got you covered. Of course languages are still being checked by native speakers, which is expected to be refined further.

Plus, for those late-night owls or when you simply want to give your eyes a break, we’ve included a sleek and easy-on-the-eyes dark mode. We hope you love using XposedOrNot as much as we loved creating it.

Stay tuned for more exciting updates on the horizon! 😊🌙🌎

darkmode

A Call for Collaborative Innovation

The journey doesn’t end here. I am eager to explore new use cases for XposedOrNot which can benefit all and I invite you to share your ideas, thoughts and suggestions. Every input is a potential stepping stone towards a more secure digital community.

Your Voice Matters

I welcome your thoughts on features that would enhance XposedOrNot for all users. If there’s something you wish to see implemented, do not hesitate to reach out.

Every one of your input is a beacon guiding the way towards improvement.

Echoing the timeless words of Robert Frost:

The woods are lovely, dark and deep,
But I have promises to keep,
And miles to go before I sleep,
And miles to go before I sleep.

In the spirit of these verses, my mission continues with fervor. There is much to do and ample opportunity for innovation. I look forward to reconnecting with updates on our progress and to discuss your feedback on potential features for XposedOrNot. Together, let’s forge a path to a more secure future.

Few Posts of Interest

Discover more from Data Breach Insights

Subscribe now to keep reading and get access to the full archive.

Continue reading