Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

True and unfortunately this doesn't often result in any damage until way later when someone buys your sensitive documents and commits fraud. By the time the fraud happens, we likely have no idea which breach the info even came from.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: