minus-squareBarbarian@sh.itjust.workslinkfedilinkarrow-up1·edit-211 months agoDepends on the implementation of different login services and the number of possible permutations. An attacker will probably get locked out of trying to log in after making dozens of guesses.
Depends on the implementation of different login services and the number of possible permutations. An attacker will probably get locked out of trying to log in after making dozens of guesses.