• spookedbyroaches@lemm.ee
    link
    fedilink
    arrow-up
    10
    ·
    1 year ago

    Just because this method is a subset of the brute force attack doesn’t mean that they don’t have request limiting. They are reusing known breached passwords from other platforms, which makes it basically a guarantee that they will get the right password if they don’t use a password manager. Their computer systems are secure, it’s just their business model that’s a privacy nightmare.