Stolen files are posted on the Dark Web (which requires a special web browser called Tor). Usually, hacked data is difficult to reach or sort through. But that site is experiencing some lag time due to high traffic.
Just plug in a name or email address, and you’ll find out if someone who signed up for the service.Ĭheck to see if an e-mail address you recognise is part of the database on the web: – or –