Security analysis of Posterous | Dark Hacker News