• DannyBoy@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    6
    ·
    25 days ago

    They can also pull from breach lists. If xyz hacker posts a list of email and passwords online you’ve got a pretty good starting point.