It could be used by a disgruntled employee for identity theft. Or they dump them in an insecure location that is breached.
This item has no comments currently.
It looks like you have JavaScript disabled. This web app requires that JavaScript is enabled.
Please enable JavaScript to use this site (or just go read Hacker News).
It could be used by a disgruntled employee for identity theft. Or they dump them in an insecure location that is breached.