The current authentication system allows users to register and log in using temporary/disposable email addresses. This presents a security and abuse concern, as malicious users can exploit this loophole to create multiple fake accounts, bypass rate limiting, or avoid accountability.