What are the limitations of IMAP?
IMAP is equipped with an authentication mechanism, but anyone who understands how to steal a password can easily circumvent the authentication mechanism by using a protocol analyzer to obtain the client's username and password.