…and here’s how they could have done it. Not every hack requires the knowledge of exploiting buffer overflows and SQL injections… sometimes there’s just plain bad design at work.
From the same twisted impulse (though probably not the same people) who brought you “HillaryIsMomJeans.com”.
There is, of course, a web application security spin to this story, but I would guess that social engineering is involved in the hack. The real question is, how much light does it shine on Palin’s governing style and on the whole shady practice of using personal email for government business?
Day: September 17, 2008
Sheer brilliance from my good friend Greg Greene: http://johnmccaininventedtheblackberry.com. Feed it suggestions on Twitter via #invented.
This was the straw that broke the camel’s back, btw: you can now follow me on Twitter too. Just don’t expect any deep thoughts.