: It represents one of the largest aggregations of stolen data ever made public via cloud services and torrent trackers.

: Discuss why MFA is the most effective defense against leaks like Collection #1.

: Unlike a single hack, this was a compilation of many previous breaches (over 2,000 sources).