lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <10716460359.20040222011416@gmx.net>
From: partysan_FFF at gmx.net (partysan_FFF@....net)
Subject: Would you trust these Emails (EBAY & PAYPAL)


TW> As a consequence I'd suggest to any serious company doing business on
TW> the Internet not to send any messages via email ("They normally don't
TW> send mails at all. So I can't trust this one.") or only send messages as
TW> non-formatted text, which raises the bar of fooling people (less people
TW> will be fooled if the real link isn't hidden behind an image or a link
TW> description.

TW> I hate HTML mails anyway and don't let my mail client load images of the
TW> Internet (thus HTML mails reach me in an ugly, naked form).

TW> kind regards,
TW> Tobias Weisserth


A concept like PGP would probably be fairly safe.  Mails from your
bank, for instance, should be digitally signed.  That would make them
a lot harder to fake.  I agree on the non-HTML part, they are an
unnecessary risk.

Is there a way to track where the credit card information from the
fake paypal site goes?






Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ