Deutsch   English   Français   Italiano  
<vbg51a$lm8$1@nnrp.usenet.blueworldhosting.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder9.news.weretis.net!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: "Edward Rawde" <invalid@invalid.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Phishing
Date: Fri, 6 Sep 2024 19:59:37 -0400
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Lines: 78
Message-ID: <vbg51a$lm8$1@nnrp.usenet.blueworldhosting.com>
References: <vbcvp4$eoqp$1@dont-email.me> <vbdgep$kgm$1@nnrp.usenet.blueworldhosting.com> <vbfivs$tlhp$3@dont-email.me>
Injection-Date: Fri, 6 Sep 2024 23:59:38 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
	logging-data="22216"; mail-complaints-to="usenet@blueworldhosting.com"
Cancel-Lock: sha1:7eEeXm4s+51rZ6mK0k7XoJfwfTI= sha256:zHeQZldg5YfvqkOtIvAxcn9Fbk9IqrcSvCi2shGf3qA=
	sha1:EVK9806rmkXNPH0uKebTz6svOqU= sha256:fDcov1MaH+OMvRCGmmREdz4KST5xkASIWDuOnUIV6hQ=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157
X-RFC2646: Format=Flowed; Response
X-Newsreader: Microsoft Outlook Express 6.00.2900.5931
X-Priority: 3
X-MSMail-Priority: Normal
Bytes: 4420

"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vbfivs$tlhp$3@dont-email.me...
> On 9/5/2024 4:56 PM, Edward Rawde wrote:
>> "Don Y" <blockedofcourse@foo.invalid> wrote in message news:vbcvp4$eoqp$1@dont-email.me...
>>> I'm checking my "deflected" incoming mail to see if anything that
>>> *should* have been allowed through was mistakenly diverted
>>> (false positive).
>>>
>>> I see a fair number of phishing attempts on my "public" accounts.
>>> But, all are trivially identified as such.
>>>
>>> So, how is it that folks (organizations) are so often deceived
>>> by these things?  Are users just lazy?  Would it be more helpful
>>> to have mail clients make it HARDER to activate an embedded
>>> URL or "potentially compromised" attachment?
>>>
>>> Or, will the stupidity of users adapt, accordingly?
>>
>> More likely the ingenuity of scammers will adapt accordingly.
>
> They have to coax/entice/trick you into DOING something.
> By making it harder for you to "do things" acts as a
> deterrent to these sorts of exploits.

Making it harder to do things will likely mean that nothing gets done.

>
> E.g., if you had to cut/paste a URL into a browser (instead
> of clicking on a link embedded in an email), you would be
> less inclined to casually do so.  AND, would be forced to
> see the ACTUAL URL instead of letting it hide behind
> "click here".

While most people who read this group can do that, most people cannot.
Also have you tried doing that with a phone?

>
>> I got a "Your amazon account has been charged" call today.
>> Caller ID gave a local number, just different last four digits.
>
> Our phone is pretty well locked down.  Calls go to one of
> two voice mails -- without ringing the phone; neither is
> checked often (and one is NEVER checked).

I usually answer local calls and calls from known numbers.
Others may be answered if they start leaving a message, depending on the message.

>
> OTOH, if you are a WELCOMED caller, the phone actually *rings*.
>
> Two of our phones only accept calls from the OTHER of our
> phones (the numbers have never been "given out" to anyone
> so an incoming call that is not from one of our phones is
> obviously not something we want to receive).  If you
> deliberately fail to set up your voicemail, then these
> calls just fall off into never-never-land.
>
>> I don't bother filtering email except at the server level where some countries can't connect inbound at all.

Actually that's not quite true because at the server level I also have
https://rspamd.com/ which works well.

I can't remember when I last got a message containing a dodgy URL or dodgy attachment.
Unexpected attachments are always discarded.
Sometimes I'll have a look at where a dodgy URL goes but most often it goes nowhere due to my outbound filtering.

>
> The phishing protection doesn't rely on filtering messages.
> Rather, just not making URLs easy to access (or attachments
> easy to open).
>
> Folks who have any of my "non-public" email addresses are
> treated like you would expect a trusted correspondent to be
> treated.  But, traffic on the "public" (published) accounts
> is highly censored.
>
>