On Sat, 12 Sep 2020, Loren Wilton wrote:

It's properly formed. Compare the plaintext part to the HTML part, note that the base64 block is QP'd base64, and note that there's some more QP spam pitch text after the base64 block.

Ah. I completely missed the division boundary a third of the way thru, or for that matter the pdf attachment at the end.

I fairly commonly see plaintext versions that include some of the hidden or small-font obfuscation from the HTML part. My assumption is there is some tool that generates the plaintext from the spam-built HTML and does a suboptimal rendering job. I'm guessing this isn't generally a problem since I think most mail programs suppress the plaintext part when there is an HTML part present.

It's a problem for SA because enough embedded "invisible" text can push the suspicious text out of the "body" buffer, thus hiding it from rules.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 [email protected]                         pgpk -a [email protected]
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  Are you a mildly tech-literate politico horrified by the level of
  ignorance demonstrated by lawmakers gearing up to regulate online
  technology they don't even begin to grasp? Cool. Now you have a
  tiny glimpse into a day in the life of a gun owner.   -- Sean Davis
-----------------------------------------------------------------------
 Today: the 337th anniversary of the muslim Ottoman defeat at Vienna

Reply via email to