(no title)
jdludlow | 11 years ago
Now if they wanted to supply a list of hashes to the public, then you could check your own without knowing any of the other addresses used to generate the remaining hashes.
jdludlow | 11 years ago
Now if they wanted to supply a list of hashes to the public, then you could check your own without knowing any of the other addresses used to generate the remaining hashes.
kevinoconnor7|11 years ago
jdludlow|11 years ago
If I wanted to be truly malicious I'd have my online checker return a "Nope, you're all good" and then add that email address to the short list of accounts to go after.
bitJericho|11 years ago