I replied in that thread, so hopefully he responds too :) One guy there made a good...
How can an attacker open the DB with used OTPs? Do you mean that the attacker will...
How would an attacker break the DB from only having used OTPs and the DB? Is that...
Will the copied OTPs be of any use, when they are One Time use only? He can only...