@andrei0x309
100/100, but when I do speculation, I want to think of all possible scenarios and always give the benefit of the doubt.
Because there were 3 possible scenarios I could see:
1 They have access to the phone data for everybody, not just a hash of the phone
2 They have access to only older verification data, and newer ones are not stored
3 They used client-side encryption guarded by data that is available only on the client side
The last one(3) I invalidated, so to the best of my knowledge, only 1 and 2 are possible now.