I just got the email from haveibeenpwned. F Trello anyways.

  • _dev_null@lemmy.zxcvn.xyz
    link
    fedilink
    English
    arrow-up
    0
    ·
    10 months ago

    Get something like splunk to do it. I’m wondering what the rules for this might look like, especially if this was e.g. distributed scraping.

    • tsonfeir@lemm.ee
      link
      fedilink
      English
      arrow-up
      0
      ·
      10 months ago

      With a site that active, they really need something that can’t identify strange traffic patterns. Hell, maybe they do but no one cared to do anything. Maybe no one listens to IT… that never happens /s