Three opportunities for theft:
on server by other registered users
into server using HTTP
on network by snooping
Previous slide
Next slide
Back to first slide
View graphic version