lingo.lol is one of the many independent Mastodon servers you can use to participate in the fediverse.
A place for linguists, philologists, and other lovers of languages.

Server stats:

54
active users

#emailsecurity

1 post1 participant0 posts today
mailbox.org<p>When emails don't reach your students, your e-learning business is at risk! </p><p>oncampus GmbH faced this exact challenge – their emails were marked as spam. How did Germany's leading digital education provider solve this critical problem? </p><p>Watch the video to discover their success story! 👉 <a href="https://mailbox.org/en/post/enhanced-email-security-in-the-education-sector" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailbox.org/en/post/enhanced-e</span><span class="invisible">mail-security-in-the-education-sector</span></a></p><p><a href="https://social.mailbox.org/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a> <a href="https://social.mailbox.org/tags/digitaleducation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>digitaleducation</span></a> <a href="https://social.mailbox.org/tags/casestudy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>casestudy</span></a> <a href="https://social.mailbox.org/tags/elearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>elearning</span></a></p>
TechnoTenshi :verified_trans: :Fire_Lesbian:<p>Attackers spoofed Google using a DKIM replay exploit and a Google Sites phishing page to deliver fake subpoena emails that passed SPF, DKIM, and DMARC checks. Trusted infrastructure used to bypass user skepticism.</p><p><a href="https://easydmarc.com/blog/google-spoofed-via-dkim-replay-attack-a-technical-breakdown/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">easydmarc.com/blog/google-spoo</span><span class="invisible">fed-via-dkim-replay-attack-a-technical-breakdown/</span></a></p><p><a href="https://infosec.exchange/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/DKIM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DKIM</span></a> <a href="https://infosec.exchange/tags/DMARC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DMARC</span></a></p>
knoppix<p>Proton Mail launches “Newsletters” view — a built-in tool to manage email subscriptions without giving up privacy. 📬</p><p>No third-party access, no tracking, no ads. Just a cleaner inbox, on your terms. A welcome upgrade from one of the most privacy-respecting email providers. 🔒✉️</p><p><span class="h-card" translate="no"><a href="https://mastodon.social/@protonprivacy" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>protonprivacy</span></a></span> </p><p><a href="https://proton.me/blog/proton-mail-newsletters" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">proton.me/blog/proton-mail-new</span><span class="invisible">sletters</span></a></p><p><a href="https://mastodon.social/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://mastodon.social/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://mastodon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mastodon.social/tags/Proton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proton</span></a> <a href="https://mastodon.social/tags/ProtonMail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtonMail</span></a> <a href="https://mastodon.social/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a> <a href="https://mastodon.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://mastodon.social/tags/DigitalPrivacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitalPrivacy</span></a> <a href="https://mastodon.social/tags/BigTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BigTech</span></a> <a href="https://mastodon.social/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://mastodon.social/tags/TechForGood" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechForGood</span></a> <a href="https://mastodon.social/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a> <a href="https://mastodon.social/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a></p>
mailbox.org<p>No more spam in your inbox! Disposable email addresses are the insider tip for anyone wanting to protect their privacy.</p><p>✅ Register anonymously with unknown services <br>✅ Enter competitions without spam risk <br>✅ Online shopping without marketing harassment</p><p>At mailbox.org, disposable addresses are part of the complete package in standard and premium tariffs. </p><p>How it works and why you need it: <a href="https://mailbox.org/en/post/how-disposable-addresses-against-digital-threats" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailbox.org/en/post/how-dispos</span><span class="invisible">able-addresses-against-digital-threats</span></a></p><p><a href="https://social.mailbox.org/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://social.mailbox.org/tags/DataProtection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataProtection</span></a> <a href="https://social.mailbox.org/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a></p>
The Spamhaus Project<p>📢 Mail relays | Are you forwarding mail without checks, validation, or spam filtering? You could be creating a real mess. 😵‍💫</p><p>Typos, spamtraps, and forged senders can quickly snowball into blocklistings and delivery failures. </p><p>In part two of our short series on mail relays, we jump into the chaos careless forwarding can cause, and what you can do to avoid it:</p><p>👉 <a href="https://www.spamhaus.org/resource-hub/deliverability/mail-relays-part-2-problems-with-forwarded-mail" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/deli</span><span class="invisible">verability/mail-relays-part-2-problems-with-forwarded-mail</span></a> </p><p><a href="https://infosec.exchange/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/tags/Deliverability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Deliverability</span></a> <a href="https://infosec.exchange/tags/EmailFiltering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailFiltering</span></a></p>
Jerry on Mastodon<p>1. Hacker News, a <a href="https://hear-me.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> newsletter, is sent from a domain where DMARC policy is p=none, which tells email providers, like gmail, to deliver all email that is screaming, "I am a Hacker News spoof email sent by a POS scammer" to the intended recipient anyway. p=none means take no action, even if you know it's a scam. Spam folder optional. Email services and clients will oblige. WTF Hacker News?</p><p>2. Hacker News is also using an insecure signature algorithm for signing their newsletter. </p><p>3. An extremely well-known Cybersecurity expert is sending the newsletter from a domain that has no DMARC record at all, so all spoof emails claiming to be from them will be delivered. And likely this is being constantly exploited. A DMARC policy of p="reject" would have those spoof emails trashed and not delivered. But no DMARC policy means "whatever, and I don't want to know". So, spoof emails go through unstopped and no reports of abuse are being sent to this person either. And it's their job to tell us how to stay secure and not be fooled by spoof emails. WTF?</p><p>Sometimes I don't understand how things work in the world.</p><p><a href="https://hear-me.social/tags/HackerNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HackerNews</span></a> <a href="https://hear-me.social/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://hear-me.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a></p>
🆘Bill Cole 🇺🇦<p>Overkill. With many receivers treating no SPF as a blanket '-all' it does very little to make it explicit. </p><p>However, if you really feel that you must give SPF records to every subdomain, make sure to also give them null MX records to drive the point home that the subdomain is not for <a href="https://toad.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a>.</p><p><a href="https://toad.social/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toad.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/@ais_security/114556032057865718" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ais_security</span><span class="invisible">/114556032057865718</span></a></p>
nearshorecyber<p>Our Houston-based client is looking for a 👉 𝗿𝗲𝗺𝗼𝘁𝗲 👈 (must be in Mexico) Senior Email Security Analyst with experience with Abnormal Security or a similar email security platform. If you're interested, please apply in English :</p><p><a href="https://recruiterflow.com/nsc/jobs/38" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">recruiterflow.com/nsc/jobs/38</span><span class="invisible"></span></a> </p><p><a href="https://infosec.exchange/tags/Remote" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Remote</span></a> <a href="https://infosec.exchange/tags/WFH" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WFH</span></a> <a href="https://infosec.exchange/tags/Mexico" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Mexico</span></a> <a href="https://infosec.exchange/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/tags/AbnormalSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AbnormalSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareAnalysis" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareAnalysis</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Nearshore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nearshore</span></a> <a href="https://infosec.exchange/tags/CybersecurityJobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CybersecurityJobs</span></a></p>
Jerry on Mastodon<p>Did you know that if a spammer uses your email address as the FROM: address, which is easy to do, all the bounce messages will go to your email address? If the spammer really hates you, they will send millions of emails with your FROM: address and you will get a million bounce messages.</p><p>Can you stop this or prevent this? No</p><p>Why would a mail provider send you a bounce message, knowing you're innocent? Because that's how someone wrote the protocol back then, and nobody changes it or does it differently because ... reasons.</p><p>Does the spammer get a bounce message? Nope, not one. </p><p>Does the SMTP sending account owner whose credentials were stolen be notified about bounces so they can stop the spam? Nope.</p><p>Just millions of emails sent every day to poor schlameels who have no idea why they are getting them and who can't do anything about them.</p><p>The more I learn about the email protocols, the more I realize how terrible the design is.</p><p><a href="https://hear-me.social/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a> <a href="https://hear-me.social/tags/spoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spoofing</span></a> <a href="https://hear-me.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hear-me.social/tags/spam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spam</span></a></p>
CybersecKyle<p>Okay friends, so I’m in the middle of creating a new brand, you may have guessed it, CybersecKyle. I’m going to be building this into Cybersecurity resources, tips, and overall online safety for people. </p><p>This will include; videos, articles, etc. Still coming up with ideas. Videos will be short form at first. Insta reels, TikTok, YT shorts, etc. </p><p>I’m open to suggestions!</p><p>Be on the lookout for more news. I’ll be posting the social accts once I have them ready. </p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/ITSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITSecurity</span></a> <a href="https://infosec.exchange/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://infosec.exchange/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/tags/Tech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tech</span></a></p>
Jerry on Friendica<p>Scammers set up domains with instructions to ignore email security failures on their emails via a DMARC record and Google et al. deliver their obvious dangerous spam to you. I thought, "how stupid" to create a security system so easily disabled.</p><p>But, I realize it was NEVER designed to protect YOU from spam. It has ONE purpose. Protect corporations from being spoofed. Period. They set their DMARC to reject or quarantine emails from their domains that fail security. It works perfectly for this and ONLY this. They are protected. You, not so much, but you are not their concern.</p><p>It could have been easily expanded to kill spam by not allowing the checks to be ignored, but why should they? They are protected. Common attitude today by too many people.</p><p>Am I wrong?<br><a href="https://my-place.social/search?tag=CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://my-place.social/search?tag=EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a></p>
mailbox.org<p>📚 Mehr Sicherheit für digitale Bildung: Wie oncampus mit <span class="h-card" translate="no"><a href="https://social.mailbox.org/@mailbox_org" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mailbox_org</span></a></span> zuverlässige E-Mail-Kommunikation sicherstellt</p><p>Als oncampus 2021 mit E-Mail-Zustellproblemen kämpfte, wurde klar: Es braucht eine sichere, zuverlässige Lösung. </p><p>Mit mailbox.org fand der E-Learning-Anbieter einen DSGVO-konformen Partner, der Spam-Probleme löste und Datenschutz in deutschen Rechenzentren garantiert. Die ganze Erfolgsgeschichte hier: <a href="https://mailbox.org/de/post/e-mail-sicherheit-im-bildungssektor" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">mailbox.org/de/post/e-mail-sic</span><span class="invisible">herheit-im-bildungssektor</span></a></p><p><a href="https://social.mailbox.org/tags/mailboxorg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mailboxorg</span></a> <a href="https://social.mailbox.org/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://social.mailbox.org/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.mailbox.org/tags/oncampus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>oncampus</span></a></p>
Haris Razis<p>Some of the reasons I chose <span class="h-card" translate="no"><a href="https://mastodon.social/@Tutanota" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Tutanota</span></a></span> and Coolify.</p><p><a href="https://haris.razis.com/posts/my-struggles-with-selfhosting/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">haris.razis.com/posts/my-strug</span><span class="invisible">gles-with-selfhosting/</span></a></p><p>Extremely happy with both of them! Props to the devs.</p><p><a href="https://mastodon.social/tags/selfhosted" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>selfhosted</span></a> <a href="https://mastodon.social/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a></p>
The Spamhaus Project<p>📣 LESS THAN 2 WEEKS until access will start to be restricted to those querying our blocklists via Hetzner’s infrastructure. Stay protected for free with Spamhaus Technology's Data Query Service - changes to config take minutes. </p><p>Read more &amp; sign up: 👇<br><a href="https://www.spamhaus.org/resource-hub/email-security/query-the-legacy-dnsbls-via-hetzner/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">spamhaus.org/resource-hub/emai</span><span class="invisible">l-security/query-the-legacy-dnsbls-via-hetzner/</span></a> </p><p><a href="https://infosec.exchange/tags/EmailFiltering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailFiltering</span></a> <a href="https://infosec.exchange/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://infosec.exchange/tags/Email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Email</span></a></p>
Sophie 🏳️‍⚧️ 💜 🎹 🪗<p>Really digging the Private Duck Addresses </p><p>Exaggerated Oprah voice: You get a randomly generated email address that strips trackers then forwards to my real account, and YOU get a randomly generated email address that strips trackers then forwards to my real account!</p><p><a href="https://glammr.us/tags/duckDuckGo" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>duckDuckGo</span></a> <a href="https://glammr.us/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://glammr.us/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a> </p><p><a href="https://duckduckgo.com/duckduckgo-help-pages/email-protection/duck-addresses/what-are-private-duck-addresses/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">duckduckgo.com/duckduckgo-help</span><span class="invisible">-pages/email-protection/duck-addresses/what-are-private-duck-addresses/</span></a></p>
Masayuki60 🦮🇯🇵 🇺🇦 🐕🇺🇲📷<p>Perhaps a knee-jerk reaction, but I have canceled my paid subscription to ProtonMail for reasons that have been reported widely today. I'm transferring the hosted domain there over to Tuta.</p><p><a href="https://social.vivaldi.net/tags/proton" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>proton</span></a> <a href="https://social.vivaldi.net/tags/ProtonMail" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ProtonMail</span></a> <a href="https://social.vivaldi.net/tags/tuta" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tuta</span></a> <a href="https://social.vivaldi.net/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a> <a href="https://social.vivaldi.net/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a></p>
Jerry on Mastodon<p>Important reminder, if you own a domain name and don't use it for sending email. </p><p>There is nothing to stop scammers from sending email claiming to be coming from your domain. And the older it gets, the more valuable it is for spoofing. It could eventually damage your domain's reputation and maybe get it blacklisted, unless you take the steps to notify email servers that any email received claiming to come from your domain should be trashed.</p><p>Just add these two TXT records to the DNS for your domain:<br>TXT v=spf1 -all<br>TXT v=DMARC1; p=reject;</p><p>The first says there is not a single SMTP server on earth authorized to send email on behalf of your domain. The second says that any email that says otherwise should be trashed.</p><p>If you do use your domain for sending email, be sure to add 3 records: <br>SPF record to indicate which SMTP server(s) are allowed to send your email.<br>DKIM records to add a digital signature to emails, allowing the receiving server to verify the sender and ensure message integrity.<br>DMARC record that tells the receiving email server how to handle email that fails either check.</p><p>You cannot stop scammers from sending email claiming to be from your domain, any more than you can prevent people from using your home address as a return address on a mailed letter. But, you can protect both your domain and intended scam victims by adding appropriate DNS records.</p><p>UPDATE: The spf and the dmarc records need to be appropriately named. The spf record should be named "@", and the dmarc record name should be "_dmarc". </p><p>Here's what I have for one domain. </p><p>One difference that I have is that I'm requesting that email providers email me a weekly aggregated report when they encounter a spoof. gmail and Microsoft send them, but most providers won't, but since most email goes to Gmail, it's enlightening when they come.</p><p><a href="https://hear-me.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://hear-me.social/tags/email" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>email</span></a> <a href="https://hear-me.social/tags/DomainSpoofing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DomainSpoofing</span></a> <a href="https://hear-me.social/tags/EmailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EmailSecurity</span></a> <a href="https://hear-me.social/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a></p>
George E. 🇺🇸♥🇺🇦🇵🇸🏳️‍🌈🏳️‍⚧️<p><a href="https://bofh.social/tags/AskFedi" rel="nofollow noopener" target="_blank">#AskFedi</a> - I need a new <a href="https://bofh.social/tags/SMIME" rel="nofollow noopener" target="_blank">#SMIME</a> <a href="https://bofh.social/tags/cert" rel="nofollow noopener" target="_blank">#cert</a> for my <a href="https://bofh.social/tags/email" rel="nofollow noopener" target="_blank">#email</a><span>. My old cert has been expired for well over a year now it looks like. Oops. ;-)<br><br>Is </span><a href="https://bofh.social/tags/GlobalSign" rel="nofollow noopener" target="_blank">#GlobalSign</a> still the recommended <a href="https://bofh.social/tags/CA" rel="nofollow noopener" target="_blank">#CA</a><span> for globally-trusted SMIME certs?<br><br>If not, what CA would you recommend?<br><br></span><a href="https://bofh.social/tags/EmailEncryption" rel="nofollow noopener" target="_blank">#EmailEncryption</a> <a href="https://bofh.social/tags/EmailSecurity" rel="nofollow noopener" target="_blank">#EmailSecurity</a> <a href="https://bofh.social/tags/DigitalSignatures" rel="nofollow noopener" target="_blank">#DigitalSignatures</a> <a href="https://bofh.social/tags/InfoSec" rel="nofollow noopener" target="_blank">#InfoSec</a> <a href="https://bofh.social/tags/PKI" rel="nofollow noopener" target="_blank">#PKI</a></p>
Stefano Marinelli<p>Sharing some technical details about how I'm setting up the hosted email service. It will not be a service of BSD Cafe but tied to my own business. It will run entirely on BSD systems and on bare metal, NOT on "cloud" VPS. It will use FreeBSD jails or OpenBSD or NetBSD VMs (but on bhyve, on a leased server - I do not want user data to be stored on disks managed by others). The services (opensmtpd and rspamd, dovecot, redis, mysql, etc.) will run on separate jails/VMs, so compromising one service will NOT put the others at risk. Emails will be stored on encrypted ZFS datasets - so all emails are encrypted at rest - and only dovecot will have access to the mail datasets. I'm also considering the possibility of encrypting individual emails with the user's login password - but I still have to thoroughly test this. The setup will be fully redundant (double mx for SMTP, a domain for external IMAP access that will be managed through smart DNS - which will distribute the connections on the DNS side and, in case of a server down, will stop resolving its IP, sending all the connections to the other. Obviously, everything will be accessible in both ipv4 and ipv6 and in two different European countries, on two different providers. Synchronization will occur through dovecot's native sync (extremely stable and tested). All technical choices will be clearly explained - the goal of this service is to provide maximum transparency to users on how things will be handled.</p><p><a href="https://mastodon.bsd.cafe/tags/BSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSD</span></a> <a href="https://mastodon.bsd.cafe/tags/FreeBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FreeBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/OpenBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/NetBSD" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetBSD</span></a> <a href="https://mastodon.bsd.cafe/tags/emailHosting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailHosting</span></a> <a href="https://mastodon.bsd.cafe/tags/encryption" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>encryption</span></a> <a href="https://mastodon.bsd.cafe/tags/ZFS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZFS</span></a> <a href="https://mastodon.bsd.cafe/tags/dovecot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dovecot</span></a> <a href="https://mastodon.bsd.cafe/tags/opensmtpd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensmtpd</span></a> <a href="https://mastodon.bsd.cafe/tags/rspamd" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rspamd</span></a> <a href="https://mastodon.bsd.cafe/tags/emailSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailSecurity</span></a> <a href="https://mastodon.bsd.cafe/tags/techTransparency" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>techTransparency</span></a> <a href="https://mastodon.bsd.cafe/tags/ipv6" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ipv6</span></a> <a href="https://mastodon.bsd.cafe/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a></p>
Not Simon<p><strong>SlashNext</strong> describes "conversation overflow" attacks designed to trick machine learning security controls into allowing phishing emails through. Hidden text in the email is intended to read like a legitimate, benign message, tricking ML into marking the email as "good." 🔗 <a href="https://slashnext.com/blog/new-attack-techniques-to-bypass-machine-learning-security-controls/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">slashnext.com/blog/new-attack-</span><span class="invisible">techniques-to-bypass-machine-learning-security-controls/</span></a></p><p><a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/emailsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>emailsecurity</span></a> <a href="https://infosec.exchange/tags/phishing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>phishing</span></a> <a href="https://infosec.exchange/tags/ML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ML</span></a> <a href="https://infosec.exchange/tags/conversationoverflow" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conversationoverflow</span></a> <a href="https://infosec.exchange/tags/machinelearning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>machinelearning</span></a></p>