Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

And by the time you regain access to the phone number, the account might already be using a different one...


They generally run a cron job on your email to see what are the vulnerable accounts & then decide in order to which one is most important




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: