View Single Post
Old 09-17-2007, 08:31 PM   #15 (permalink)
coastuser
New Member
 
Join Date: Sep 2007
Model: Pearl
PIN: N/A
Carrier: T-Mobile
Posts: 9
Post Thanks: 0
Thanked 0 Times in 0 Posts
Default

"In order to hack an email from the sever they'd almost have to be monitoring it at the exact second it came in, modified it, sent it, then sent a different reply back...."

You're getting closer. Except for the last part. The reply back is automatic since it has already been altered.

But listen. I am not trying to convince anyone here. I am more concerned about my friend. The insertion was not inflammatory in the sense that noone outside of the sender and the receiver would read it and understand that it was a problem.
Offline   Reply With Quote