Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

maybe they need passwords to login as user?


even if they want to emulate a user, they can do so without their password. Or if doing so in a simplistic way, they can login with said user's hashed password, instead of the original plaintext.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: