As you know from working with the developer tools in the browser, it's possible to circumvent pretty much any frontend restrictions if you try hard enough. For example, with our Phone field, though we've restricted it on the frontend, we can always inspect the HTML and enter in any value that we want. As a quick note, it's important to also validate your data on the backend to be sure it's properly formatted.
One thing that corporate data breaches and hacks always have in common is that the attacker is taking advantage of a weakness in the system being used. Very rarely is it actually a case of a leaked password; more often, it's weak cryptography or even a frontend problem. We'll discuss security further in Chapter 17, Security and Keys. You can learn more at OWASP.org.
Let's continue and review what we've learned.