Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would only say that it is a violation of trust if they somehow installed the certificate on your phone when installing the linkedIn app...

If a user knowingly installs this, with the understanding that linkedin is essentially a proxy for their entire email ecosystem - then they are knowingly trusting linkedin.

To be honest, I can see this being used by sales reps. They are often interested in connecting to people and understanding peoples backgrounds. They also move quite freely between organisations, and don't have a religious tie to their email and/or privacy (in the sense of their corporate email privacy).



1) Your average user has no idea what an iOS cert is doing.

2) Your average IT department in any publicly traded company would NEVER let this fly.

3) Any general council would shat all over this. No one likes fighting with lawyers, and this is a battle I'd never put on my plate.

It's odd to assume generic users understands IMAP or what a proxy is. Remember how Apple makes products for dumb people? Yeah. They ran a campaign on that.

On top of all of this, they have a "if you're a Google Apps admin" section where the only way to block it is to disable ALL OAuth applications.

No self-respecting CTO/CIO would let this occur in an organization they hope to responsibly grow.


You are correct. I guess it all comes down to how transparent Linkedin are with the users installing this stuff. Will they disclose to the user exactly how this works like in their blog post - or will they obfuscate the whole activity and represent something else to the user.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: