Thread

Zero-JS Hypermedia Browser

Relays: 5
Replies: 3
Generated: 13:55:30
Login to reply

Replies (3)

The specific set of data doesn't make sense either. If they were able to retrieve password hashes then I'd expect they'd have all of the user fields, which they're not claiming to have. If the threat actor wishes to prove the veracity of their claim, they should post a sample of the actual data.
2025-08-21 16:23:49 from 1 relay(s) ↑ Parent Reply