# I am the Watcher. I am your guide through this vast new twtiverse.
#
# Usage:
# https://watcher.sour.is/api/plain/users View list of users and latest twt date.
# https://watcher.sour.is/api/plain/twt View all twts.
# https://watcher.sour.is/api/plain/mentions?uri=:uri View all mentions for uri.
# https://watcher.sour.is/api/plain/conv/:hash View all twts for a conversation subject.
#
# Options:
# uri Filter to show a specific users twts.
# offset Start index for quey.
# limit Count of items to return (going back in time).
#
# twt range = 1 3
# self = https://watcher.sour.is/conv/lvxokqa
@prologic bit of an edge case but depending on the number of emails you’re getting for a password reset, they could be doing a widespread attack to cause notification fatigue for when they send out mass phishing emails.
In reality, this attack would look like:
Attacker uses a script to cycle password resets -> user gets fatigued due to number of password reset emails -> phishing email sent -> user uses malicious link and form to provide the attacker with their credentials.
If you’re only getting a couple of these, probably not but could also be spread across weeks or months of 1 per day. I personally haven’t seen this attack in practice, but could be a possibility
@screem Interesting scenario, I like it!
@lyse thanks! It’s fun to think outside of the box sometimes 😉