-
…and here’s how they could have done it. Not every hack requires the knowledge of exploiting buffer overflows and SQL injections… sometimes there’s just plain bad design at work.
-
From the same twisted impulse (though probably not the same people) who brought you “HillaryIsMomJeans.com”.
-
There is, of course, a web application security spin to this story, but I would guess that social engineering is involved in the hack. The real question is, how much light does it shine on Palin’s governing style and on the whole shady practice of using personal email for government business?