Hacker News new | past | comments | ask | show | jobs | submit login

You don't necessarily have to hack the provider. You can hack the user's laptop and siphon the data out of their email client. If they use a web client, you can read the files it caches. Or maybe you can set up IMAP and have your malware read a copy of everything. To the email provider, all of this just looks like the user is reading their email.



Fair, though I think it's still true that it's a very difficult threat model.

Also worth noting that email clients typically tell you about new logins/clients (though I don't think their way of doing it is particularly robust).




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: