Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Usually for this kind of thing samples are provided. This attacks feels too sophisticated for a mere sale. At best, if this is legitimate, it's misdirection.


needs proof of life. none of the "vendors" will consider it without proof. in-fact they would likely verify if they were real dumps.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: