For many years, remote Access Systems, Medical Records Systems, SSL Certificate Generation and many other systems rely email for authentication.This presentation explains how to well known weaknesses in opportunistic email encryption can be used toCompromise accountsHijack computersGenerate fraudulent SSL CertificatesAccess confidential medical/financial records.Intercept, hijack, and modify https sessions.Capture bank credentialsPerform social engineering / fraud