Then stop. However what happens is that after the above the input data is stored. If you provide one this input data they have access. Its like giving away your password. [...] Early UNIX versions did the very same thing, and together with lack of shadow file this made password cracking easy because /etc/passwd was readable by everyone.