On the other hand.... Trusting a user to go to a website is a risk also. Many users just type something like "chase" into their starting webpage (yahoo, bing, google, etc..) and go to the first link listed.
---- Matthew Huff | 1 Manhattanville Rd Director of Operations | Purchase, NY 10577 OTA Management LLC | Phone: 914-460-4039 aim: matthewbhuff | Fax: 914-694-5669 > -----Original Message----- > From: mailop [mailto:mailop-boun...@mailop.org] On Behalf Of Carl > Byington > Sent: Thursday, April 14, 2016 1:06 PM > To: Henry Yen <he...@aegis00.com> > Cc: mailop <mailop@mailop.org> > Subject: Re: [mailop] Should I be disappointed with Reflexion? > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > On Thu, 2016-04-14 at 12:56 -0400, Henry Yen wrote: > > > 6. If the information is of particularly high value, look at what > > the more competent end of banks and other financial institutions do > to > > add trust > > > Both Chase bank (jpmchase) and Barclays bank send me emails with > > direct links in them, from a bigfootinteractive mailserver. Does that > > violate these three suggestions? > > Yes. I have never seen a bank that did otherwise, so per Steve Atkins I > have never seen a competent (wrt email) bank. Every bank for which I > have email samples does the same - they are training their users to be > phished. And that training seems to be working. > > > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.14 (GNU/Linux) > > iEYEAREKAAYFAlcPzg4ACgkQL6j7milTFsHfXwCeK8qm4wLZGozACHbmprsPQRii > tN0An0pTt4rhKQD7inm9BBduNTHBjtUI > =0vHM > -----END PGP SIGNATURE----- > > > > _______________________________________________ > mailop mailing list > mailop@mailop.org > https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop _______________________________________________ mailop mailing list mailop@mailop.org https://chilli.nosignal.org/cgi-bin/mailman/listinfo/mailop