Hello Michael,

On 13.03.25 18:50, Michael Peddemors via mailop wrote:
> Like to hear from the community, any and all ideas surrounding the topic
> of feedback intel to email operators when they have compromised emails,
> from sources that they should block to protect their customers..


I like the idea and would love to be informed. We of course have our own
protections in place to identify abused accounts, but sometimes they
just slip through the cracks or are careful enough to not trigger our
detections early.

Plus our Darknet-Monitoring sometime takes a while to find compromised
accounts.


As for how - I wonder if one could create something like or extend the
.well-known/security.txt to list methods on how to send the data (by
mail, POST call, ?).

If it is done with something like a block list, it should have some kind
of timestamp. Otherwise, it'd be difficult to see if the account was
compromised again.


OTOH - how do we avoid those methods getting abused?


Regards,
Thomas Walter

-- 
Thomas Walter
Datenverarbeitungszentrale

FH Münster
- University of Applied Sciences -
Corrensstr. 25, Raum B 112
48149 Münster

Tel: +49 251 83 64 908
Fax: +49 251 83 64 910
www.fh-muenster.de/dvz/

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to