Hello Michael, On 13.03.25 18:50, Michael Peddemors via mailop wrote: > Like to hear from the community, any and all ideas surrounding the topic > of feedback intel to email operators when they have compromised emails, > from sources that they should block to protect their customers..
I like the idea and would love to be informed. We of course have our own protections in place to identify abused accounts, but sometimes they just slip through the cracks or are careful enough to not trigger our detections early. Plus our Darknet-Monitoring sometime takes a while to find compromised accounts. As for how - I wonder if one could create something like or extend the .well-known/security.txt to list methods on how to send the data (by mail, POST call, ?). If it is done with something like a block list, it should have some kind of timestamp. Otherwise, it'd be difficult to see if the account was compromised again. OTOH - how do we avoid those methods getting abused? Regards, Thomas Walter -- Thomas Walter Datenverarbeitungszentrale FH Münster - University of Applied Sciences - Corrensstr. 25, Raum B 112 48149 Münster Tel: +49 251 83 64 908 Fax: +49 251 83 64 910 www.fh-muenster.de/dvz/
smime.p7s
Description: S/MIME Cryptographic Signature
_______________________________________________ mailop mailing list mailop@mailop.org https://list.mailop.org/listinfo/mailop