|
| 26 Feb 2016 05:57 AM |
Face it:
If it has a p4ssw0rd, it's hackable. |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 06:17 AM |
wrong forum
#Code print("This is a siggy") |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 06:29 AM |
no, accounts are hardly hackable. the only ones who can actualy hack it is the government
#code print( ~~[[CHECK OUT NOOBION]]~~ http://www.roblox.com/My/Groups.aspx?gid=2687134 |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 07:16 AM |
| the only way people can get your account details is if you fall for a scam, get PGed, or KLed |
|
|
| Report Abuse |
|
|
iinarrow
|
  |
| Joined: 22 May 2011 |
| Total Posts: 2327 |
|
|
| 26 Feb 2016 07:23 AM |
want any acc you want? just go to the stolen dump on v3r. found alot :^)
"Ehhy ye young whipper snappers can't even fix 'emselves up right'in proper an' read a couple o' walls 'o text, can yee? Young'ins these days, always lookin' for th' easy solution to everythang in everythang" |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 08:21 AM |
not sure they're hackable pws directly are not hackable unless you are bruteforced, or pg'ed, or phised, but those do not count as hacking
it would be SOMEWHAT hacking if one were to break into ROBLOX's webserver and idk if ROBLOX does crypt their account info or just save in a .txt format.
also, why aren't other ways of authentication hackable? explain. |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 01:42 PM |
| Authentication uses algorithms, so if they are reverse engineered, you can get into any account. |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 03:21 PM |
"If it has a p4ssw0rd, it's hackable."
Then what was the point of this since anything can be reverse engineered? |
|
|
| Report Abuse |
|
|
|
| 26 Feb 2016 04:27 PM |
"no, accounts are hardly hackable. the only ones who can actualy hack it is the government"
Well, the government cannot hack an Iphone so...
When in doubt,divide by zero. |
|
|
| Report Abuse |
|
|
|
| 27 Feb 2016 06:02 AM |
what are you people talking about the government has access to any device simply because the creators of the software always have to leave backdoors for the gov which hence, explains why exploiters/hackers get past security, well that is for operating systems mostly |
|
|
| Report Abuse |
|
|