Comment by meowface
8 years ago
What can they even say? "Change everything" doesn't really work. Any potentially secret data to or from a server could have been exposed.
8 years ago
What can they even say? "Change everything" doesn't really work. Any potentially secret data to or from a server could have been exposed.
Yes, but in general keys provide ongoing access; sensitive data itself is more limited in scope. Keys, auth tokens, etc. would be what I'd focus on.