Home / Education / Crypto / Interview / 16 Billion Passwords Leaked: Why Blockchain-Based Identity Matters Now
Interview
10 min read
easy

16 Billion Passwords Leaked: Why Blockchain-Based Identity Matters Now

Published
Onkar Singh
Published

In June 2025, cybersecurity researchers confirmed the largest password leak in internet history. Over 16 billion unique credentials, including passwords, session tokens, cookies, and metadata, were exposed in a single compiled breach

This wasn’t just about login details. It enabled full impersonation of users across platforms such as Apple, Google, GitHub, and Telegram. The leak was largely compiled from data-stealing malware known as infostealers, raising serious questions about the viability of password-based identity in the modern internet.

While password breaches are not new, the scale and depth of this one reveal a deeper structural problem. It is no longer just about compromised credentials. It is about a failing identity model that continues to rely on weak, static secrets stored in centralized databases.

To better understand the significance of this breach and where digital identity is heading, CCN spoke to several industry leaders working at the intersection of cybersecurity, blockchain, and privacy-preserving identity systems. 

These included Victor Vernissage, a researcher and co-founder of Paradigm Research and Humanode with expertise in macroeconomics, AI, and decentralized governance; Dato Kavazi, co-founder of Humanode and the architect of its Sybil-resistant biometric system; Jesse Phillips, CEO of Trustware and a former executive at Binance and Rain.com; Kadan Stadelmann, CTO of Komodo Platform; and Nanak Nihal Khalsa, co-founder of Holonym, a decentralized privacy and identity infrastructure project.

Together, their insights offer a clear picture: the era of passwords is ending, and blockchain-based identity is no longer a future concept, but it is a present necessity.

How Years of Infostealer Attacks Led to One Massive Data Leak

According to analysis from Cybernews, Sophos, and other security researchers, this breach was not the result of a single attack but an accumulation of years of infostealer campaigns . The leaked bundle contained credentials stolen directly from user devices, largely through malware that scraped browser-stored passwords, tokens, and authentication cookies. Over 85% of the leaked data reportedly came from such attacks.

The leak was briefly available on the dark web and underground forums before being removed. But the damage may already be done. With metadata and session cookies in hand, attackers can impersonate users without even needing their password.

As traditional systems continue to fail under mounting cyber threats, this breach underscores a growing case for the move to blockchain, where security, transparency, and user control aren’t just features, but foundational.

What Blockchain Identity Solves and What It Doesn’t

Jesse Phillips, CEO of Trustware, put the issue in stark terms:

“Passwords are like deadbolts on the front door while the attack is riding in the Amazon package you just signed for. Attackers aren’t just guessing passwords anymore. They’re getting malware on your device to steal everything,” warned Phillips.

He added:

“Blockchain identity doesn’t solve everything, but it absolutely shuts down impersonation. In a world where private keys are the ultimate proof, the ultimate unlock, an attacker can ransack your digital life, scrape sensitive info, and still walk away empty-handed if they don’t have the key.”

“Own your keys. Own your identity.”

Nanak Khalsa also framed the breach as an inevitable failure of legacy systems:

“What we’re witnessing is not a sudden failure, but a predictable result of long-standing architectural decisions,” said Nanak Khalsa, co-founder of Holonym. “Passwords have always been weak proxies for identity: replicable, irrevocable, and entirely reliant on central trust. We are not at a breaking point, we passed it some time ago.”

He emphasized that true security will only come from decentralized models that don’t rely on any single institution to protect user credentials or access.

Session Hijacking and the Need for Biometric Proof

Victor Vernissage of Paradigm Research and Humanode sees this breach as a failure in how we handle session integrity, not just identity:

“This type of breach is a session hijacking attack when the perpetrator sidesteps all authentication layers, including 2FA. Just verifying identity does not help here, we need stronger session verification,” emphasized Vernissage.

According to Vernissage, the basic approach would be having short sessions with frequent reauthentication. A better approach is to require identity re-verification for sensitive actions like GitHub’s ‘sudo mode, he further added.

To push it even further, he noted that apps using Humanode can demand biometric proof to make sure it’s the same person performing re-verification, and not another person with the same credentials.

He argued that the attackers can adapt to this as well but they will have to compromise the user’s device and hijack biometric input. This is much harder, and there is a 600k bounty for those who figure out how to bypass the liveness detection modules.

“Still, if the user does not care about their own security, nothing will help. Long-term resilience depends on shifting security literacy and accountability onto users. Any app that says ‘we’ll keep you safe without your effort’ should not be trusted.”

Telegram as a Hot Wallet? And the Case for Passkeys

With Telegram also affected by the leak, and its growing role in Web3 gaming and token sales, security concerns are escalating.

Phillips was clear: 

“Fundamentally if it touches the internet, treat it like a hot wallet. We can’t all be hermits with cold storage and airgapped devices. We can be cognizant of the fact that chat apps and social media are ground zero for malicious actors to source, target and execute attacks.”

Vernissage added:

“What could help here is Telegram implementing Passkeys support. This technology also doesn’t provide a biometric identity, but it allows gating access to using the cryptographic material through the biometric authentication on the end user device.”

“In this scenario, the biometric data and the cryptographic material for the Passkey are both securely stored in a dedicated hardware module effectively preventing leaks of both kinds of secrets. At least, that is the idea, we didn’t audit the implementations deployed in the wild, so we can’t really vouch for them.”

Are Biometrics Too Risky? Not If Designed Right

Critics often argue that biometrics are immutable, and thus dangerous. Dato Kavazi of Humanode disagrees:

“Biometrics are not permanent. It really depends on how you handle the data. Their permanency is dependent on the security infra which usually poorly handles biometric data revealing it during the biometric sequence or ending up creating the ‘honey pot’ problem,” Kavazi argued.

“Right now we handle this issue by making sure that every 6 months our biometric servers are updated, a completely new system is set up and the biometric data is wiped.”

“We use autonomous CVMs (Confidential Virtual Machines) to compute and store biometric data. Since it’s autonomous, not only we don’t know what’s going on inside, we also have no way into the system as admins,” he noted.

He explained that CVMs remain inherently susceptible to exploits, particularly zero-day vulnerabilities; however, their design intentionally positions them as low-value targets, thereby mitigating this risk considerably.

“This architecture enables us to consistently uphold our core value proposition: that within a single CVM generation, each account unequivocally corresponds to a unique individual.”

He noted that CVMs do not maintain identity continuity across generations. Practically, this means that the same individual’s identity across two separate CVMs is represented by distinct, randomly assigned identifiers, explicitly not derived from biometric data.

In summary, the central idea is this: biometric data itself is immutable, yet if the system is architected from the ground up to categorically prevent biometric data leakage, and furthermore, regularly purges and resets all sensitive data, then such an approach is acceptable or at the very least, substantially superior to current industry alternatives.

Biometrics: Local Guardian, Not Global Identifier

Kadan Stadelmann, CTO of Komodo Platform argued that

“Biometrics should stay local. They work well for unlocking your phone, but if your iris scan leaks, you can’t reset it. Putting biometrics on‑chain is a privacy disaster waiting to happen.”

Khalsa echoes this: “Biometrics can help protect access, but only if the data never leaves the device. Otherwise, phishing bodies, not passwords, becomes the new threat model.

Zero Trust and Cryptographic Expectations

Kavazi concluded with a broader perspective on the architecture of the internet:

“The Internet has always been a zero-trust zone. That is arguably one of the main ‘features’ of it.”

“At the same time, you don’t need to identify yourself or your peers for most interactions. When we have to, we do so, even today. With the protocols we currently have in play, we’ll be fine.”

“Logins are secure as long as the end-to-end encryption exists, and the peers of it are not compromised.”

Digital Hygiene in the Age of Crypto: Why User Behavior Still Matters

While blockchain-based identity systems are rapidly evolving to counter modern threats, they cannot fully compensate for poor digital hygiene. The recent breach involving 16 billion credentials underscores the reality that individual behavior remains a critical component of digital security.

No matter how advanced authentication systems become, whether through biometrics, cryptographic keys, or zero-knowledge proofs, they still rely on users to follow basic security practices. Even the most secure systems can be undermined by careless behavior such as reusing passwords, storing private keys in unsecured locations, or falling for phishing attacks.

Therefore, digital hygiene means taking proactive steps to minimize risk. This includes using hardware wallets or secure enclaves for key storage, avoiding cloud backups of sensitive data, staying updated on device and app security, and remaining cautious about unsolicited messages and links. In essence, it’s about being a conscious participant in one’s own security.

In the world of crypto, your identity and assets are ultimately protected by the decisions you make. As security systems grow more sophisticated, the human element remains both the greatest strength and the most significant vulnerability. With blockchain poised to become a mainstream foundation for identity and access, strong user habits must go hand in hand with robust technical infrastructure.

Conclusion

The 16 billion password breach exposes more than just fragile credentials, it highlights the fundamental flaws in how digital identity is designed today. You are not simply facing isolated security failures; but you might be confronting an outdated identity model built on static secrets and centralized trust.

The future, as many experts agree, is heading toward systems where trust is cryptographic, identity is self-owned, and session hijacking is no longer as easy as stealing a browser cookie.

But change will not come from technology alone. Real progress will depend on usability, smart defaults, and cultural shifts.

“People don’t want new mental models. They want better defaults,” said Nanak Khalsa. “Real adoption comes when users are protected by the system without even realizing it.”

Phillips also echoed this sentiment:

“The goal isn’t to educate people into better behavior. The goal is to protect them without making them think.”

In a world where identity theft no longer requires even a password, that may be the only path forward.

Disclaimer: The information provided in this article is for informational purposes only. It is not intended to be, nor should it be construed as, financial advice. We do not make any warranties regarding the completeness, reliability, or accuracy of this information. All investments involve risk, and past performance does not guarantee future results. We recommend consulting a financial advisor before making any investment decisions.
Was this Article helpful? Yes No
Onkar Singh holds an MSc in Blockchain and Digital Currency and has accumulated three years of experience as a digital finance content creator. Throughout his career, he has collaborated with various DeFi projects and crypto media outlets. In his leisure time, he enjoys fitness activities at the gym and watching movies across different genres. Balancing his professional and personal interests, Onkar continues to contribute to the digital finance landscape while pursuing his hobbies.
See more