Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is interesting. You can exchange or even purchase stolen or breached data to confirm its authenticity or access your own data (see haveibeenpwned). You can also leverage the data to find its origins, leaker, etc.

You cant handle other materials to find the perpetrators?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: