• DannyBoy@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    1
    ·
    9 days ago

    They can also pull from breach lists. If xyz hacker posts a list of email and passwords online you’ve got a pretty good starting point.