

2·
21 days agoThis is a brilliant description; the feeling OP has is probably on a way more abstract level than most of the comments here are thinking of.
This is a brilliant description; the feeling OP has is probably on a way more abstract level than most of the comments here are thinking of.
Well, not that I approve of the practice, but you could find site logins that the email is used in, breaches that it’s been in (potentially finding (old) passwords).
With that info, if not for identity theft directly, can be used for fishing and profiling.