Deutsch   English   Français   Italiano  
<vbg6k6$10i21$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Don Y <blockedofcourse@foo.invalid>
Newsgroups: sci.electronics.design
Subject: Re: Phishing
Date: Fri, 6 Sep 2024 17:26:36 -0700
Organization: A noiseless patient Spider
Lines: 50
Message-ID: <vbg6k6$10i21$1@dont-email.me>
References: <vbcvp4$eoqp$1@dont-email.me>
 <vbdgep$kgm$1@nnrp.usenet.blueworldhosting.com> <vbfivs$tlhp$3@dont-email.me>
 <vbg51a$lm8$1@nnrp.usenet.blueworldhosting.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Sat, 07 Sep 2024 02:26:47 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="086db94f0332e0d3735a46b01b44aae1";
	logging-data="1067073"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1+1g5S8UlDyzdhO+/98SxqP"
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:102.0) Gecko/20100101
 Thunderbird/102.2.2
Cancel-Lock: sha1:ZCAKi77avjxuONWN6waWJKF/jxE=
Content-Language: en-US
In-Reply-To: <vbg51a$lm8$1@nnrp.usenet.blueworldhosting.com>
Bytes: 3597

On 9/6/2024 4:59 PM, Edward Rawde wrote:
>> OTOH, if you are a WELCOMED caller, the phone actually *rings*.
>>
>> Two of our phones only accept calls from the OTHER of our
>> phones (the numbers have never been "given out" to anyone
>> so an incoming call that is not from one of our phones is
>> obviously not something we want to receive).  If you
>> deliberately fail to set up your voicemail, then these
>> calls just fall off into never-never-land.
>>
>>> I don't bother filtering email except at the server level where some countries can't connect inbound at all.
> 
> Actually that's not quite true because at the server level I also have
> https://rspamd.com/ which works well.

I let my MTAs handle spam detection.  But, they can't determine if a
"please verify your email" message is warranted, or not.  And, those
often contain a link to make it easier for you to invoke a browser
at the specific target URL.

> I can't remember when I last got a message containing a dodgy URL or dodgy attachment.
> Unexpected attachments are always discarded.

I regularly receive attachments from folks on my non-published accounts.
Often, just photos that they are using to illustrate something.  Other
times, large chunks of code or documentation.  Sometimes, EXEs (where
they want to illustrate the behavior of a piece of code and know that I
don't have access to their native RTOS to run a compiled binary for it).

The same applies in reverse.  E.g., if I want to get an appraisal of
the differences in pronunciation for different algorithms, it's easier
to send them a WINDOWS binary and let *them* choose the words to compare.
This lets them also play with the characteristics of the *voice* (which
is different from the *pronunciation*) to accentuate any differences
they perceive -- based on their own hearing artifacts.

Of course, this all gets executed in a sandbox (belts-n-braces).

> Sometimes I'll have a look at where a dodgy URL goes but most often it goes nowhere due to my outbound filtering.
> 
>> The phishing protection doesn't rely on filtering messages.
>> Rather, just not making URLs easy to access (or attachments
>> easy to open).
>>
>> Folks who have any of my "non-public" email addresses are
>> treated like you would expect a trusted correspondent to be
>> treated.  But, traffic on the "public" (published) accounts
>> is highly censored.