Additional ideas to develop exploitation of APIs keys to compromise accounts social media used from smartphones applications, and synchronization of phone address books with online address books