The interesting thing about this site is that the passwords are stored in a one-way hash. Checking is done by encrypting the supplied password and comparing to the stored one-way encrypted password. As an admin, I can reset a password, or dump the hash of a password, but not extract one. Getting a password for the site would involve one of three techniques:fetching the password in transitrunning a dictionary attach - which will not work if you password is strong enoughreversing the password hash - Wordpress uses a modified MD5, so you can read up on the technique here https://www.johndcook.com/blog/2019/01/24/reversing-an-md5-hash/If its the same email I got, it offers to prove they have photos of you masticating in front of the computer to 5 of your friends. If it was real blackmail they would have just sent one photo to you. And no hacker has devised a technique to see through the tape I have over the camera lens on my laptop.