I just got the email from haveibeenpwned. F Trello anyways.

    • _dev_null@lemmy.zxcvn.xyz
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.

      • tsonfeir@lemm.ee
        link
        fedilink
        English
        arrow-up
        0
        ·
        10 months ago

        With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s