• PixxlMan@lemmy.world
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    According to the quote they would've used breached passwords. You don't know anything about request limiting. It wasn't just randomly entering passwords unrestricted, as per your own quote.