Hacker News new | past | comments | ask | show | jobs | submit login

So true. Speculation in the original comment thread (http://news.ycombinator.com/item?id=4337938) included MITM attacks, keyloggers, sleeper programs left over from an earlier (known) breakin, brute force, etc.

Most of the ideas batted around were technical in nature and somewhat advanced.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: