# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 3
# self = https://watcher.sour.is/conv/lvxokqa
@prologic bit of an edge case but depending on the number of emails you’re getting for a password reset, they could be doing a widespread attack to cause notification fatigue for when they send out mass phishing emails.

In reality, this attack would look like:
Attacker uses a script to cycle password resets -> user gets fatigued due to number of password reset emails -> phishing email sent -> user uses malicious link and form to provide the attacker with their credentials.

If you’re only getting a couple of these, probably not but could also be spread across weeks or months of 1 per day. I personally haven’t seen this attack in practice, but could be a possibility
@screem Interesting scenario, I like it!
@lyse thanks! It’s fun to think outside of the box sometimes 😉