Comment by meowface

8 years ago

What can they even say? "Change everything" doesn't really work. Any potentially secret data to or from a server could have been exposed.

Yes, but in general keys provide ongoing access; sensitive data itself is more limited in scope. Keys, auth tokens, etc. would be what I'd focus on.