• Barbarian@sh.itjust.works
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    10 months ago

    Depends on the implementation of different login services and the number of possible permutations. An attacker will probably get locked out of trying to log in after making dozens of guesses.