Horror? Something they could all change in 5 minutes is not a horror.
Yeah... I’m trying to figure out exactly why this is a big deal. So we call and prank them now? Or we text bomb them? Ummm... that’ll change things. Maybe I’m just missing the “Horror” part of this.
Just think if someone was sending you emails from your email with your private phone numbers. What else would they have?
What if you changed it?
“Yeah... Im trying to figure out exactly why this is a big deal.”
The Democrats have to do damage control. They can’t trust their phone. Right now everything is wide open for social engineering, has been for hours. Social engineering is how Guccifer hacked these accounts in the first place. So you get a new phone, how will you communicate that number? If a new number for is communicated to you do you trust it? If you call that number you just compromised your new phone. This has created a situation of utter chaos. Would any Dem congressmen trust anything but face to face conversations for the next few days? No!
In this chaos is the prefect opportunity to drop a bomb shell.
The Horror part of the story comes when those phone numbers are cross-referenced with foreign entities, porn sites, call girls or boys, the Clinton Foundation, the State Department, the Palestinian Authority, Black Lives Matter, the KKK or whomever. This should be a story with legs, if only for a couple days or so.
a) The myth of Dhimmicrat invincibility just went KABOOM !
b) Not to mention the implicit threat that nothing they have electronically is safe.
c) The pitchforks are coming out.
You are. Hackers typically show some of the data they have obtained from their efforts as a way of signalling to the victim how successful their access efforts were. Showing files from someone's PC, and their emails indicates that the hacker was able to access significant amounts of material, maybe even every file on the systems they compromised.
Also, more than cell phone numbers were released. One file purports to have passwords to various web sites used for filing employment tax information. If true, those passwords would have provided the hacker with access to those systems prior to the publication of the passwords. That suggests the hacker may have a lot more data from those systems.
Not just the information but imagine the forever its going to take for everyone to switch phone numbers, email accounts, etc and getting those thousands of other phones and email accts coordinated with each other.