In late 2015, 15 million T-Mobile customers learned that they had been victims of a two-year security breach at Experian. Since then, the 150-million victim Equifax breach has made the Experian breach look kind of puny, but at the time it became public it was a Big [expletive] Deal. Of course, a class-action lawsuit was… Read More »
The Thunderbird team needs to figure out how to make it possible for extension maintainers to port their extensions to newer Thunderbird versions without a huge amount of effort. Many Thunderbird users rely on extensions, and they are going to keep using Thunderbird 60 until the extensions they rely on are supported in newer versions.
You know how sometimes you encounter something that is so terrible and appalling that you feel you just have to tell other people about it? Well, for me, today is one of those days. But look, I’m a nerd who writes email software and likes to write raw HTML. If the terms “SMTP” and “MIME”… Read More »
Recently, I wrote about what prompted me to add Blue State Digital to my global kill file. Today, CQ Engage, a service offered by CQ Roll Call, joins in that dubious honor. The things you need to do to be a reputable bulk mail service provider are actually very simple and straightforward: Publish an anti-spam… Read More »
If you are active online in liberal politics, you’ve probably received email from a company called Blue State Digital, even if you didn’t realize it. Blue State Digital is a digital advocacy platform used almost exclusively by liberal organizations and candidates. If you get email from Democratic candidates, a lot of it comes from Blue… Read More »
A legitimate email from AT&T does its level best to masquerade as a phishing email.
It wasn’t Constant Contact. It was never Constant Contact. Constant Contact is fine. Forget I mentioned them.
How I plumbed the depths of my email server and falsely concluded that the problem was Not My Fault.
[See Adding malicious IPs in DNSBLs to iptables automatically for a new and improved version of this that uses iptables instead of hosts.deny, which is necessary since tcpwrappers is mostly deprecated at this point.] I run my own mail server, which means that there are hackers trying 24×7 to break into the server by connecting to… Read More »
Much has been written about the fact that Zynga is evil. From my own experience, I’d like to add massively incompetent and law-breaking to the list of adjectives that accurately describe them. A number of days ago, I decided to give Words With Friends, a Scrabble™-like game, on my smart-phone. I was bored, and I wasn’t… Read More »