TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: SHADOW
date: 2014-10-09 13:29:00
subject: Re: AddressBook Harvested

On Thu, 09 Oct 2014 21:06:08 -0400, "(PeteCresswell)" 
wrote:

>Per David H. Lipman:
>>*  Always use the BCC field when emailing a number of recipients or using a 
>>Distribution List (aka; D-List)
>
>I always assumed that was Good Practice just on the basis of not
>throwing around people's email addresses in the open... but now that I'm
>thinking about it, wouldn't the BCC list be just as easy to extract from
>an intercepted email as would any other field?

 If the one of the recipients of the email has a trojan on his
PC , the trojan will capture only the sender's email addy if it was
sent BCC. If it was a CC all the addresses will be captured.
 If the cloud server or the sender's PC was compromised, or if
it was a MITM attack, BCC or CC would not make any difference.
 []'s
-- 
Don't be evil - Google 2004
We have a new policy  - Google 2012
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.