The current authentication system allows users to register and log in using temporary/disposable email addresses. This presents a security and abuse concern, as malicious users can exploit this loophole to create multiple fake accounts, bypass rate limiting, or avoid accountability.
The current authentication system allows users to register and log in using temporary/disposable email addresses. This presents a security and abuse concern, as malicious users can exploit this loophole to create multiple fake accounts, bypass rate limiting, or avoid accountability.