(no title)
theicfire | 3 years ago
Users can check their own email/phone/etc to verify that the attacker has the data, without the attacker revealing the data.
I'm surprised this doesn't happen more.
theicfire | 3 years ago
Users can check their own email/phone/etc to verify that the attacker has the data, without the attacker revealing the data.
I'm surprised this doesn't happen more.
unknown|3 years ago
[deleted]