Technology ❯ User Privacy ❯ Data Access ❯ Unauthorized Access
The company has not said how many users were affected or which hashing method was used.