Fedi: @retr0id@retr0.id
Macroblog: https://www.da.vidbuchanan.co.uk/blog/
1. compile a list of every email ever (from public data breaches)
2. find the email with smallest Levenshtein distance from the user-entered email
3. you now have a valid email address!
1. compile a list of every email ever (from public data breaches)
2. find the email with smallest Levenshtein distance from the user-entered email
3. you now have a valid email address!