Why You Should Take Advantage of SMTP over TLS

In my previous blog post, I introduced the topic of SMTP over TLS and discussed why it’s an important tool to use to protect the privacy of email communication. In that post, I wrote that you do not have to encrypt email at this time, but I promised that I would write a subsequent post arguing that you should do so. This is that post. How Much of My Mail Should I Encrypt? You might be an... Continue »

Toward Better Privacy in Email - SMTP over TLS

Electronic surveillance of email and other communications is unfortunately a fact of life these days. It seems that not a week goes by where we don’t hear some new report that “they” are listening to what we once thought to be our private messages and phone calls, and this has folks rightly concerned about just how much “they” might know. While there have been some extreme reactions to these... Continue »

Spamhaus DBL Changes Coming - What List Users Need to Know

Beginning on July 1, Spamhaus will be publishing new return codes for its DBL list. My colleague, Christine Borgia, has already blogged about its effect on senders, but I wanted to take a moment to discuss how consumers of the DBL might be impacted. The goal of the changes, which are shown in the table below, is to introduce more granularity to the response codes, and better identify the reason... Continue »

Using DMARC To Overcome Hurdles To DMARC Adoption

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a steadily emerging, mature technology that allows domain owners to assert their preferences for mail disposition based on authentication results (SPF and/or DKIM). Through the publication of a record in DNS, a domain can request that any unauthenticated mail be rejected, treated as suspicious (a.k.a., quarantined), or have... Continue »

M3AAWG Publishes ARF/X-ARF Usage Recommendation

M3AAWG, the Messaging, Malware, and Mobile Anti-Abuse Working Group (http://www.m3aawg.org) recently published a document affirming their recommendation that Abuse Reporting Format (ARF) be the preferred method of reporting email abuse through feedback loops (FBLs) and other means. In addition, the document recommends that the X-ARF format be used to report any abuse incidents that are... Continue »