Blind Carbon Copy - Security Considerations

Security Considerations

Both RFC 2821 and RFC 2822 discuss problems with Bcc: in their "Security Consideration" sections, in part because, as mentioned above, the processing for the Bcc: header is not standardized and there are several different ways that it can commonly be implemented.

  • RFC 2821 notes that some mail systems will add private headers showing all recipients that the e-mail was sent to, thus leaking the Bcc: list.
  • RFC 2822 notes three problems:
    • If the Bcc: header is completely removed, people who receive a blind copy may not notice they are not on either the To: or Cc: and reply to everyone, thus leaking that blind copies were sent.
    • If the Bcc: header is not removed for people being sent a blind copy, then all blind copy recipients will know who got blind copies.
    • If the email addresses on the Bcc: header are removed, but the header is not, this will leak the fact that some blind copies were sent.
  • E-mail spam occasionally uses Bcc: to create fake accidental leaks of confidential information, e.g. in a variant of the pump and dump scheme.

Read more about this topic:  Blind Carbon Copy

Famous quotes containing the word security:

    Modern children were considerably less innocent than parents and the larger society supposed, and postmodern children are less competent than their parents and the society as a whole would like to believe. . . . The perception of childhood competence has shifted much of the responsibility for child protection and security from parents and society to children themselves.
    David Elkind (20th century)