[ExI] hacked email

Adrian Tymes atymes at gmail.com
Tue Nov 25 17:41:45 UTC 2014

On Nov 25, 2014 8:49 AM, "spike" <spike66 at att.net> wrote:
> We don't need military level security, just an indicator.  Wouldn't that
> work?

Why wouldn't your forging cousin have the same access as anyone else in
your family to this?  Given the situation, the table on the sending
computer could have been looked up at the same time your cousin guessed the
shared passwords.

Also, why wouldn't anything that inconvenient to use not get quickly
abandoned - assuming you could talk everyone into using it in the first
place?  I suspect any practical solution here must be 100% automated,
otherwise you are just wasting time...but at the same time, any 100%
automated solution needs to verify which person is actually at the
keyboard.  In theory passwords do this, but you might want to consider
biometrics too (especially since most sites do not use them yet).

Also, that mother who deleted emails - are they still in her Trash folder?
Many email clients "delete" by moving stuff to Trash, then auto-emptying
Trash some undefined time later (often at least weeks).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.extropy.org/pipermail/extropy-chat/attachments/20141125/b8f3fb11/attachment.html>

More information about the extropy-chat mailing list