So true. Speculation in the original comment thread (http://news.ycombinator.com/item?id=4337938) included MITM attacks, keyloggers, sleeper programs left over from an earlier (known) breakin, brute force, etc.
Most of the ideas batted around were technical in nature and somewhat advanced.
Most of the ideas batted around were technical in nature and somewhat advanced.