
Imagine a scenario where you create a personal webpage, control
access to the content of this page by issuing account names and passwords to
co-workers who would e-mail you for requesting access, and post critical
comments about your employer. Your superiors at work gain access to it by using
the credentials you provided to a co-worker, and as a result of him seeing your
posts on that page, you are fired.
These are facts of an actual case[1],...