Well, not that I approve of the practice, but you could find site logins that the email is used in, breaches that it’s been in (potentially finding (old) passwords).
With that info, if not for identity theft directly, can be used for fishing and profiling.
Well, not that I approve of the practice, but you could find site logins that the email is used in, breaches that it’s been in (potentially finding (old) passwords).
With that info, if not for identity theft directly, can be used for fishing and profiling.