WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2026 Poal.co

462

(post is archived)

[–] [deleted] 2 pts

From the perspective of an attacker, if the goal is to impersonate people or hijack their accounts, you have names, phone numbers, and associated account URLs. That's a lot of information in one place to get you started."

"What stands out about this incident is the sheer volume of data that’s been collected."