Bookmark
Actually, DMARC works fine with mailing lists
https://begriffs.com/posts/2018-09-18-dmarc-mailing-list.html, posted 2018 by peter in email howto spam toread
Lists should keep the From address, the Subject, and the Message totally unchanged. They should add a Sender header to indicate their relay role, and set at least the List-Id and List-Unsubscribe headers for mailbox rules and subscription management.
This configuration will allow mailing lists to function as proper SMTP citizens in the age of DMARC.
Bookmark
DomainKeys, DKIM, SPF, SpamAssassin Email Validator
www.brandonchecketts.com/emailtest.php, posted 2013 by peter in email online security spam testing
Now you can quickly view your DomainKeys, DKIM, and SPF validitay, and SpamAssassin score in one place. Just send an email to any address @www.brandonchecketts.com. Then check here to see the results.
Bookmark
DMARC.org - Domain-based Message Authentication, Reporting and Conformance
dmarc.org/, posted 2013 by peter in email spam standard
DMARC, which stands for "Domain-based Message Authentication, Reporting & Conformance", is a technical specification created by a group of organizations that want to help reduce the potential for email-based abuse by solving a couple of long-standing operational, deployment, and reporting issues related to email authentication protocols. [...] A DMARC policy allows a sender to indicate that their emails are protected by SPF and/or DKIM, and tells a receiver what to do if neither of those authentication methods passes - such as junk or reject the message. DMARC removes guesswork from the receiver's handling of these failed messages, limiting or eliminating the user's exposure to potentially fraudulent & harmful messages. DMARC also provides a way for the email receiver to report back to the sender about messages that pass and/or fail DMARC evaluation.
Bookmark
SPF: Introduction
www.openspf.org/Introduction, posted 2011 by peter in email networking reference security spam
The Sender Policy Framework (SPF) is an open standard specifying a technical method to prevent sender address forgery. More precisely, the current version of SPF — called SPFv1 or SPF Classic — protects the envelope sender address, which is used for the delivery of messages. See the box on the right for a quick explanation of the different types of sender addresses in e-mails.
Even more precisely, SPFv1 allows the owner of a domain to specify their mail sending policy, e.g. which mail servers they use to send mail from their domain. The technology requires two sides to play together: (1) the domain owner publishes this information in an SPF record in the domain's DNS zone, and when someone else's mail server receives a message claiming to come from that domain, then (2) the receiving server can check whether the message complies with the domain's stated policy. If, e.g., the message comes from an unknown server, it can be considered a fake.
Bookmark
DomainKeys Identified Mail (DKIM)
www.dkim.org/, posted 2011 by peter in email networking reference security spam
DomainKeys Identified Mail (DKIM) lets an organization take responsibility for a message while it is in transit.
The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for delivery. Technically DKIM provides a method for validating a domain name identity that is associated with a message through cryptographic authentication.
Bookmark
Gravatars: why publishing your email's hash is not a good idea
www.developer.it/post/gravatars-why-publishing-your-email-s-hash-is-not-a-good-idea, posted 2009 by peter in email hack privacy security spam
The guys at gravatar.com offer a nice service: for website owners, they let you automatically associate an avatar to your users, through the user's email address. The users who register to gravatars.com are able to change their gravatar and the change will be visible on all gravatar-enabled websites where they registered with the same email.
...
There is a piece of information which must be made public, though. It's this 32 char string which serves as a token for your web browser to retrieve the right image. How much information are we leaking to the bad people inhabiting the internet? Can that key be used to retrieve our email?
Bookmark
Google's reCAPTCHA busted by new attack • The Register
www.theregister.co.uk/2009/12/14/google_recaptcha_busted/, posted 2009 by peter in ai google nlp spam
Jonathan Wilkins of iSEC Partners said the method had a total success rate of 17.5 percent against reCAPTCHA. The rate is significant because of the wide use of botnets by spammers and other miscreants. Even a modest-sized network of 10,000 infected machines with a success rate of 0.01 percent would yield 10 successes every second. That could translate into 864,000 new accounts every day, he said.
...
A Google spokesman said the data collected in the report was collected in early 2008 and didn't reflect enhancements made to reCAPTCHA since then.
Bookmark
Baiting Nigerian scammers for fun (not so much for profit) - Ars Technica
arstechnica.com/web/news/2009/05/baiting-nigerian-scammers-for-fun-not-so-much-for-profit.ars, posted 2009 by peter in humor scam spam
Who are scam baiters, and why do they bother trying to give scammers the runaround? Ars explores the flourishing communities of scam baiters who help each other do everything they can to waste scammers' time, including enticing them to get ridiculous tattoos and sending them on treks across Africa for nonexistent cash.
Bookmark
Security Fix - The Scrap Value of a Hacked PC
voices.washingtonpost.com/securityfix/2009/05/the_scrap_value_of_a_hacked_pc.html, posted 2009 by peter in msm privacy security spam windows
Computer users often dismiss Internet security best practices because they find them inconvenient, or because they think the rules don't apply to them. Many cling to the misguided belief that because they don't bank or shop online, that bad guys won't target them. The next time you hear this claim, please refer the misguided person to this blog post, which attempts to examine some of the more common -- yet often overlooked -- ways that cyber crooks can put your PC to criminal use.
Bookmark
Bad Behavior / Bad Behaviour:
www.bad-behavior.ioerror.us/, posted 2009 by peter in software spam toread
Bad Behavior complements other link spam solutions by acting as a gatekeeper, preventing spammers from ever delivering their junk, and in many cases, from ever reading your site in the first place. This keeps your site’s load down, makes your site logs cleaner, and can help prevent denial of service conditions caused by spammers.