How the Pwnedlist Got Pwned

How the Pwnedlist Got Pwned: Indeed, after about a minute of instruction, I was able to replicate Hodges’ findings, successfully adding to my watchlist. I also found I could add basically any resource I wanted. Although I verified that I could add top-level domains like “.com” and “.net,” I did not run these queries because I suspected that doing so would crash the database, and in any case might call unwanted attention to my account. (I also resisted the strong temptation to simply shut up about this bug and use it as my own private breach alerting service for the Fortune 500 firms).