. . . "By grabbing hold of these, an impostor could to \"sidejack a Gmail account or other services that his victim had accessed." .