Geoff Chappell - Software Analyst
: Use services like Have I Been Pwned to see if your email was part of a known breach.
If you are researching this because you suspect your data is included, or if you found this file online: Download 100K CRYPTO TARGET txt
: Ensure all your crypto accounts use Hardware-based 2FA (like YubiKey) or an authenticator app, rather than SMS. : Use services like Have I Been Pwned
Based on common practices in the crypto-security space, a "target" list typically contains: a "target" list typically contains: