Case (
case) wrote in
fandomsecrets2014-10-13 07:03 pm
![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
![[community profile]](https://www.dreamwidth.org/img/silk/identity/community.png)
[ SECRET POST #2841 ]
⌈ Secret Post #2841 ⌋
Warning: Some secrets are NOT worksafe and may contain SPOILERS.
01.

__________________________________________________
02.

__________________________________________________
03.

__________________________________________________
04.

__________________________________________________
05.

__________________________________________________
06.

__________________________________________________
07.

__________________________________________________
08.

__________________________________________________
09.

Notes:
Secrets Left to Post: 02 pages, 039 secrets from Secret Submission Post #406.
Secrets Not Posted: [ 1 - broken links ], [ 0 - not!secrets ], [ 0 - not!fandom ], [ 0 - too big ], [ 0 - repeat ].
Current Secret Submissions Post: here.
Suggestions, comments, and concerns should go here.
no subject
(Anonymous) 2014-10-13 11:53 pm (UTC)(link)Now that you've posted this, someone could start attempting a brute force crack of every known F!Ser's passwords using Pokémon names. They might get to you pretty quickly.
Now, that doesn't mean it will happen. If you're altering the spellings slightly, the difficulty goes up a lot. And your data may not be worth the effort.
no subject
(Anonymous) 2014-10-14 12:57 am (UTC)(link)no subject