I really like his informative posts. I remember reading about how he used k-anonymity to check passwords against the pwned file without having to transmit the passwords and it led to me studying that and later using it for some professional projects.
I sometimes think what I would have done had I never read his posts about checking without transmitting real PII.
The k-anonymity is such a clever trick, I remember being impressed by the simplicity and efficacy of it back when I read about it also.
I'd also like to call out the one who Troy says suggested him [1], Junade Ali who goes into more details about this in his post about it [2]
Not because Junade would have invented it (apparently that was Pierangela Samarati, Latanya Sweeney and Tore Dalenius. [3]) but because his blog post on it is a really great explainer of it using concepts software developers are familiar with.
I sometimes think what I would have done had I never read his posts about checking without transmitting real PII.