Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

> So what are they doing with that? How can they verify it? Are they actually logging into your email account with that?

Well, of course.

> Surely (BigCompany) measures would prevent that?

What do you mean?



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: