Yeah.. while they likely store password hashes, but you still have to first accept a password as part of the process, and they must have had logging where those passwords are logged to a log file after they're accepted as input by whatever system but prior to them being hashed and stored.
__________________
Uncertainty is an uncomfortable position.
But certainty is an absurd one.
|