On the other hand....

Trusting a user to go to a website is a risk also. Many users just type 
something like "chase" into their starting webpage (yahoo, bing, google, etc..) 
and go to the first link listed.

----
Matthew Huff             | 1 Manhattanville Rd
Director of Operations   | Purchase, NY 10577
OTA Management LLC       | Phone: 914-460-4039
aim: matthewbhuff        | Fax:   914-694-5669


> -----Original Message-----
> From: mailop [mailto:mailop-boun...@mailop.org] On Behalf Of Carl
> Byington
> Sent: Thursday, April 14, 2016 1:06 PM
> To: Henry Yen <he...@aegis00.com>
> Cc: mailop <mailop@mailop.org>
> Subject: Re: [mailop] Should I be disappointed with Reflexion?
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
> 
> On Thu, 2016-04-14 at 12:56 -0400, Henry Yen wrote:
> > >   6. If the information is of particularly high value, look at what
> > the more competent end of banks and other financial institutions do
> to
> > add trust
> 
> > Both Chase bank (jpmchase) and Barclays bank send me emails with
> > direct links in them, from a bigfootinteractive mailserver. Does that
> > violate these three suggestions?
> 
> Yes. I have never seen a bank that did otherwise, so per Steve Atkins I
> have never seen a competent (wrt email) bank. Every bank for which I
> have email samples does the same - they are training their users to be
> phished. And that training seems to be working.
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.14 (GNU/Linux)
> 
> iEYEAREKAAYFAlcPzg4ACgkQL6j7milTFsHfXwCeK8qm4wLZGozACHbmprsPQRii
> tN0An0pTt4rhKQD7inm9BBduNTHBjtUI
> =0vHM
> -----END PGP SIGNATURE-----
> 
> 
> 
> _______________________________________________
> mailop mailing list
> mailop@mailop.org
> https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop
_______________________________________________
mailop mailing list
mailop@mailop.org
https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop

Reply via email to