|
|
Is this scenario against the law and if not, should it be?
Dave and Trevor know each other.
Dave finds out the password for Trevor's email.
Dave logs into Trevor's email via the internet.
Dave poses as Trevor and applies to various sites that Trevor is registered with, pretending that Trevor has forgotten his password(s).
Sites remail the password(s) to Trevor, Dave collects the emails, finds out the passwords for the sites that Trevor belongs to and then deletes the password request emails from the server.
N.B. Let's say for the sake of argument that the sites Dave wants the passwords for are not financially related, i.e. he wants these passwords in order to gather information on Trevor and not to commit any financial crime. |
|
|