-
Hey everyone,
I did say in all my posts that I do not condone the email hacking, please read. But, I do understand why Adriana's best friend wanted to figure out why Adriana had dropped out of sight.
To Rhonda, I also wondered how this could be done. I always assumed that servers like gmail are very secure. So I looked it up (just google it). It requires already knowing the person's email and cell phone number. The hacker logs into the account using the user's email and clicks on forgot password, which sends a code to the user's cell phone. Then the hacker sends a fake text to the user saying there was unusual activity detected in the account and to please text the code to stop the unauthorized activity. The hacker then uses the code to get into the account.
It all sounds hugely convoluted to me, and it would require the user falling for it. Don't know if this is how Adriana's friend did this, or maybe her best friend knew Adriana well enough to have guessed her password?
My router was accessed by someone living within range last month, so they could use my wifi. I've no idea how they got my password, other than maybe having password cracking software, but I've no idea how this would work and how effective they are if a person has a secure password (more than eight characters, small & large caps, numbers, and special characters). There must be billions of different combinations of characters and it would have to be a powerful program indeed, to run through all possible combinations. Just like the movie "The Imitation Game", about Turing's (played by Sherlock's Benedict Cumberbatch) cryptography breaking machine during WWII, to break the Germans' Enigma code generating machine.
Anyway, if someone were to invest in FBI-strenght password cracking software, you'd think they'd have to be pros at this, and would target thousands of other people too, but more to collect data that would enable identity theft than wondering how a person spends their time?