Jerry

joined 2 years ago
 

So, I'm staying with #Firefox, even though their CEO is tone-deaf and clumsy and destroying #Mozilla's reputation because today I had to remove 6 extensions in #Vivaldi (my sometimes alternate browser), several of which were security-related, because of Google's changes. I miss them. I want them back.

Bottom line. I definitely feel more secure using Firefox than a Chrome-based browser, and I won't let my disappointment with Mozilla kill off the only alternative to Google. I will continue using Firefox.

As far as using a fork of Firefox, if Firefox doesn't live on, neither will these forks.

[–] Jerry@hear-me.social 1 points 1 month ago

@MajorHavoc@programming.dev
I like how you think!

 

There's no end to corporate manipulation of people's privacy.
#CVS #privacy

https://gizmodo.com/cvs-is-turning-locked-shelves-into-an-excuse-to-make-you-download-its-app-2000555808

 

OMG. What a horrible world we live in

  1. The moment you visit a website or app with ad space, it asks a company that runs ad auctions to determine which ads it will display for you. This involves sending information about you and the content you’re viewing to the ad auction company.
  2. The ad auction company packages all the information they can gather about you into a “bid request” and broadcasts it to thousands of potential advertisers.
  3. The bid request may contain personal information like your unique advertising ID, location, IP address, device details, interests, and demographic information. The information in bid requests is called “bidstream data” and can easily be linked to real people.
  4. Advertisers use the personal information in each bid request, along with data profiles they’ve built about you over time, to decide whether to bid on ad space.
  5. Advertisers, and their ad buying platforms, can store the personal data in the bid request regardless of whether or not they bid on ad space.

https://www.eff.org/deeplinks/2025/01/online-behavioral-ads-fuel-surveillance-industry-heres-how

#CyberSecurity #Privacy

 

I received a lot of these emails. I ignored them. But did notice they did come from PayPal. Be careful. Do not click any link in any email from PayPal that is asking for money.

https://cybernews.com/security/paypal-phishing-attack-money-request-uses-real-email-address-/?source=mastodon&medium=social&campaign=cybernews&content=post

#CyberSecurity #Phishing #PayPal

 

So, why do almost all banks, in the U.S. at least, only support the worst 2FA authentication method exclusively? And, this article doesn't mention SIM-swap attacks, which are unavoidable. It can't be that difficult to support an authenticator app.

https://gizmodo.com/feds-warn-sms-authentication-is-unsafe-after-worst-hack-in-our-nations-history-2000541129

#Cybersecurity

[–] Jerry@hear-me.social 1 points 2 months ago

@daniel@masto.doserver.top
I've never had issues making changes, so I think it wouldn't be an issue. The caches should recognize they need updating.

[–] Jerry@hear-me.social 1 points 2 months ago

@nimi@norrebro.space
Hi,

Depending on the ISP, after making the changes, it usually takes up to 15 minutes for the changes to get distributed to all the DNS servers worldwide. It's pretty quick.

[–] Jerry@hear-me.social 1 points 2 months ago (2 children)

@daniel@masto.doserver.top
Should be able to.

[–] Jerry@hear-me.social 1 points 2 months ago

@Ruaphoc@mstdn.games
Thanks for this! This is on my list to look at this weekend. Thank you!

[–] Jerry@hear-me.social 1 points 2 months ago (1 children)

@idoubtit@mstdn.social
Mailpoet is a Wordpress plugin? You should still have appropriate SPF, DKIM, and DMARC records.

If you gave Mailpoet the right to use your email's SMTP server (is this how it works?) then you're fine because it's using your credentials and SPF will pass as the SMTP server is authorized to send email for your credentials.

[–] Jerry@hear-me.social 1 points 2 months ago

@esplovago@mastodon.uno
Yep.

If you want to have different rules for subdomains, then the records get much more complicated. but "v=spf1 -all" pertains to the domain and subdomains.

[–] Jerry@hear-me.social 1 points 2 months ago (1 children)

@b3lt3r@mastodon.b3lt3r.com I'm far from an expert, but if your redirect is at the server, and your server adds a ".forward" to the email, and does not alter anything, you should be fine because your SPF and DKIM should pass.

If your redirect is via an email client, or the server doesn't add a .forward, it may alter the email slightly, but in a way sufficient for DKIM to fail because the hash won't match any longer. But, I think in this case, if SPF passes, your email client would still accept it since the original DKIM passed before the forwarding.

It gets really complicated. Suggest you try it.

And this is based on my understanding, which, who knows?

[–] Jerry@hear-me.social 1 points 2 months ago

@Dero_10@mastodon.sdf.org @pteryx@dice.camp
I had that issue a lot when I was running a Linux server in the cloud. It's why I stopped using my own Wireguard VPN server I hosted on Digital Ocean. So many sites would block it.

[–] Jerry@hear-me.social 2 points 2 months ago

@adingbatponder@fosstodon.org
Can you open a support ticket for help? Or, maybe, they've already done it for you. You can check at and pick dns summary from the dropdown.

If you see the spf, dkim, and dmarc records, then you're all set.

[–] Jerry@hear-me.social 0 points 2 months ago (1 children)

@amberage @pteryx
Your points, I think, are very valid. And I live with the fear that I will end up with the same fate.

[–] Jerry@hear-me.social 2 points 2 months ago (3 children)

@pteryx@dice.camp I set up my own email server on DigitalOcean and instantly got blacklisted by Spamhaus because it was a new domain, and then by another company because the IP address belonged to DigitalOcean.

Most mail servers also flagged it as spam because the domain was less than 60 days old and because it was a .online TLD. For a long time, some of my emails were immediately bounced back or went to spam folders because of all these reasons.

I also believe that every home IP address is automatically blacklisted, which makes it worse for your roommate.

You can eventually overcome it by letting the domain reputation slowly develop and then doing a direct appeal to the blacklist companies. But, it takes a long time.

It's amazing any spam gets delivered.

 

Important reminder, if you own a domain name and don't use it for sending email.

There is nothing to stop scammers from sending email claiming to be coming from your domain. And the older it gets, the more valuable it is for spoofing. It could eventually damage your domain's reputation and maybe get it blacklisted, unless you take the steps to notify email servers that any email received claiming to come from your domain should be trashed.

Just add these two TXT records to the DNS for your domain:
TXT v=spf1 -all
TXT v=DMARC1; p=reject;

The first says there is not a single SMTP server on earth authorized to send email on behalf of your domain. The second says that any email that says otherwise should be trashed.

If you do use your domain for sending email, be sure to add 3 records:
SPF record to indicate which SMTP server(s) are allowed to send your email.
DKIM records to add a digital signature to emails, allowing the receiving server to verify the sender and ensure message integrity.
DMARC record that tells the receiving email server how to handle email that fails either check.

You cannot stop scammers from sending email claiming to be from your domain, any more than you can prevent people from using your home address as a return address on a mailed letter. But, you can protect both your domain and intended scam victims by adding appropriate DNS records.

UPDATE: The spf and the dmarc records need to be appropriately named. The spf record should be named "@", and the dmarc record name should be "_dmarc".

Here's what I have for one domain.

One difference that I have is that I'm requesting that email providers email me a weekly aggregated report when they encounter a spoof. gmail and Microsoft send them, but most providers won't, but since most email goes to Gmail, it's enlightening when they come.

#cybersecurity #email #DomainSpoofing #EmailSecurity #phishing

view more: next ›