Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login

And by the time you regain access to the phone number, the account might already be using a different one...


view as:

They generally run a cron job on your email to see what are the vulnerable accounts & then decide in order to which one is most important

Legal | privacy