Browsing: how hackers use breached data