In his analysis Ben discusses how email, ActiveSync, and social networking sensitive information is proxied through Motorola’s systems on the internet using unencrypted HTTP where anyone running a network tool can capture the exchange of data.
Read the full analysis here – http://www.beneaththewaves.net/Projects/Motorola_Is_Listening.html#Analysis1