On Thu, 09 Oct 2014 21:06:08 -0400, "(PeteCresswell)"
wrote:
>Per David H. Lipman:
>>* Always use the BCC field when emailing a number of recipients or using a
>>Distribution List (aka; D-List)
>
>I always assumed that was Good Practice just on the basis of not
>throwing around people's email addresses in the open... but now that I'm
>thinking about it, wouldn't the BCC list be just as easy to extract from
>an intercepted email as would any other field?
If the one of the recipients of the email has a trojan on his
PC , the trojan will capture only the sender's email addy if it was
sent BCC. If it was a CC all the addresses will be captured.
If the cloud server or the sender's PC was compromised, or if
it was a MITM attack, BCC or CC would not make any difference.
[]'s
--
Don't be evil - Google 2004
We have a new policy - Google 2012
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)
|