Just give them a photo off https://thispersondoesnotexist.com/

Reply to this note

Please Login to reply.

Discussion

I'm guessing it'd have to match the photo ID they want, and the voice fingerprint they would extract along with other, undisclosed information they wpuld collect about me.

It's also partially based out of principle. No hacker organization should be encouraging this level of data collection.