Dňa 23. decembra 2023 21:20:22 UTC používateľ John Levine via mailop
napísal:
>According to Slavko via mailop :
>>Plausible deniability is good for cryptographers and lawyers only. For
>>rest of world it is hard to find/realize, that private key was published
>>(someone must complain).
>
>Not
According to Slavko via mailop :
>Plausible deniability is good for cryptographers and lawyers only. For
>rest of world it is hard to find/realize, that private key was published
>(someone must complain).
Not at all. Check the DKIM key record that validates the signature on this
message.
R's,
In message <65860e95.20895.448c...@postmaster.inter-corporate.com>,
Randolf Richardson, Postmaster via mailop writes
> Would you mind sending me a linjk to your thesis? That's an
>interesting topic, and based on what you've written I get the
>impression that you have a lot more
> In message <6585e535.11582.3a72...@postmaster.inter-corporate.com>,
> Randolf Richardson, Postmaster via mailop writes
>
> >> The most commonly seen method of tracking is probably inclusion of
> >> specifically crafted links in the message, that refer to a tracking server
> >> run by the
In message <6585e535.11582.3a72...@postmaster.inter-corporate.com>,
Randolf Richardson, Postmaster via mailop writes
>> The most commonly seen method of tracking is probably inclusion of
>> specifically crafted links in the message, that refer to a tracking server
>> run by the sender, so the
> Dnia 22.12.2023 o godz. 10:54:54 Randolf Richardson, Postmaster via mailop
> pisze:
> > > Tracking/spying elements in email messsages are usually intended to spy on
> > > the *recipient* - did the recipient read the email at all, did he clicked
> > > on a link in the email etc.
> >
> >
Dnia 22.12.2023 o godz. 10:54:54 Randolf Richardson, Postmaster via mailop
pisze:
> > Tracking/spying elements in email messsages are usually intended to spy on
> > the *recipient* - did the recipient read the email at all, did he clicked
> > on a link in the email etc.
>
> ...mail server
> Dnia 22.12.2023 o godz. 16:22:45 Slavko via mailop pisze:
> > But my point was (mostly) not about courties cases, i mean usual users
> > tracking/spying (contacts, shoppings, opinions, etc), where signature is
> > checked once (at receive time), but used/stored forever. And that cannot
> > be
On Thu 21/Dec/2023 22:26:34 +0100 Gellner, Oliver wrote:
If Google would have published their DKIM private key after it was rotated in
2016, checking the DKIM signature in 2020 would have proven nothing.
Yet, if the message was ARC-sealed on forwarding and the forwarder didn't
rotate and
Dnia 22.12.2023 o godz. 16:22:45 Slavko via mailop pisze:
> But my point was (mostly) not about courties cases, i mean usual users
> tracking/spying (contacts, shoppings, opinions, etc), where signature is
> checked once (at receive time), but used/stored forever. And that cannot
> be solved by
Dňa 21. decembra 2023 21:26:34 UTC používateľ "Gellner, Oliver via mailop"
napísal:
>If Google would have published their DKIM private key after it was rotated in
>2016, checking the DKIM signature in 2020 would have proven nothing.
Yes, checking that signature in 2020 is pointless. But if
Am 21.12.2023 um 12:44 schrieb Slavko via mailop :
Dňa 20. 12. o 22:38 Gellner, Oliver via mailop napísal(a):
I’m not 100% sure what you mean by „signed forever“, but to change the topic of
this thread once more (and still stay on topic for this mailing list): While
the DKIM signature of an
Dňa 20. 12. o 22:38 Gellner, Oliver via mailop napísal(a):
I’m not 100% sure what you mean by „signed forever“, but to change the topic of
this thread once more (and still stay on topic for this mailing list): While
the DKIM signature of an email will of course exist forever, it can lose its
> On 18.12.2023 at 19:06 Slavko via mailop wrote:
>
>> Why should everyone else be forced to do that?
>
> IMO for tracking purpose... Either, for good reason -- to track DKIM's domain
> reputation, or other reason, as signed user@domain is more reliable source
> than random user@domain (and
14 matches
Mail list logo