...This makes no sense, how would "person 1" find "peron 2's" password anyway?Irraok15:09, 13 April 2007 (UTC)
It only seems logical if the Email Scam had been used to get a pin password. --Whiplash 15:11, 13 April 2007 (UTC)
...This makes no sense, how would "person 1" find "peron 2's" password anyway?Irraok15:09, 13 April 2007 (UTC)
It only seems logical if the Email Scam had been used to get a pin password. --Whiplash 15:11, 13 April 2007 (UTC)