• How to Grow Email Subscriber Signups by 377% with Content Upgrades
    https://hackernoon.com/how-to-grow-email-subscriber-signups-by-377-with-content-upgrades-37cf7b

    For a long time, the only way I was capturing email addresses on the Lean B2B website was through a basic newsletter signup. It was good, but it was not great.On the site, prospect buyers were able to download the first six chapters of the book without giving me their email addresses.There was no way for me to follow up on downloads, but I didn’t think much of it.This past September, I decided to step on the gas pedal and expand the business. One of the first things I did, was add an extra step before download. Now, visitors had to provide an email address in order to download the sampler.I was expecting an increase in signups, but never thought I would get 3 times more subscribers (300% increase) for 15 minutes of work!!I had always been skeptical of lead magnets and gated downloads, but (...)

    #email-marketing #growth #marketing #lead-generation #marketing-technology

  • How to Get 100 Subscribers/Day and Be Awesome at Email #marketing
    https://hackernoon.com/how-to-be-awesome-at-email-marketing-and-get-100-subscribers-day-ac9b497

    10 Simple Steps to Engage With Your Potential CustomersIf you’re creating content and trying to sell products online, chances are you’ve been told to create an email funnel.And if you’re just starting out you might have no idea how to create that email funnel.You might not even know what an email funnel is!An email funnel is a path a subscriber takes to become a potential customer.Everyone in your target market won’t buy from you but there is always a certain percentage of people that will.By creating a strong email funnel you’ll be more effective at selling your products than just putting your products on a products page and hoping people will click on it.That’s wishful thinking at best.Although this topic would be worthy of a fairly long eBook I’ll try my best to digest it into 10 simple (...)

    #marketing-automation #email-marketing #entrepreneurship #growth-hacking

  • Pour un visa aux Etats-Unis, il faudra révéler réseaux sociaux et contacts
    Europe 1, le 31 mars 2018
    http://www.europe1.fr/international/pour-un-visa-aux-etats-unis-il-faudra-reveler-reseaux-sociaux-et-contacts-36

    Les voyageurs qui voudront se rendre aux Etats-Unis vont bientôt devoir fournir leurs identités sur les réseaux sociaux, leurs précédents numéros de téléphone ainsi que leurs adresses email

    à partir d’une liste de réseaux sociaux qui leur sera soumise, sur quelles plateformes ils sont inscrits, et fournir "les identifiants utilisés (...) sur ces plateformes au cours des cinq ans précédents la date de la demande.

    D’autres questions portent, pour les cinq dernières années, sur les numéros de téléphone, adresses de courriels et voyages à l’étranger

    Sur le même sujet, en #israel, aux #USA et en #France :
    https://seenthis.net/messages/568484
    https://seenthis.net/messages/569119
    https://seenthis.net/messages/632978

    #surveillance #réseaux_sociaux #mot_de_passe #frontières #Etats-Unis #visa #téléphone #email et tout un tas de mots qui pourraient signifier que c’est #scandaleux #Big_Brother etc.

    • Ah super, merci.

      Tu le configures ensuite dans le php.ini ?
      Ou tu déclares le smtp dans le Facteur ?

      J’utilisais Mailcatcher depuis des années, mais avec les dernières versions il y a des problèmes d’encodage / respect strict des RFC, et le dév est assez rigide là dessus donc j’ai laissé tomber.
      https://mailcatcher.me

    • Dans les deux :
      php.ini smtp : 1025
      comme cela, par defaut tous mes mails tombent dans maildev

      Mais parfois aussi dans facteur comme smtp (ex : newsletter impose de passer par un smtp)

      Fonctionne très bien !

    • Configurer un SMTP pour PHP n’existe que pour Windows. Pour Unix ça utilise la commande sendmail qui est vieille et nulle par défaut, et qui de toute façon n’envoie pas vers un SMTP.

      On a donc installé le léger programme *msmtp* qui fournit une commande compatible avec Sendmail et dont le but est de toujours relayer vers un SMTP.
      https://doc.ubuntu-fr.org/msmtp

      Dans le fichier de config indiqué, on dit qu’on veut aller vers localhost:1025 qui est le SMTP de MailDev.

      Enfin il faut dans le php.ini, indiquer la commande qu’on veut pour remplacer sendmail (et relancer Apache) :

      sendmail_path = /usr/bin/msmtp -t

      C’est super simple à installer et configurer, que ce soit MailDev ou msmtp, et paf ! C’est trop génial !

  • L’Arabie saoudite pourrait mettre un terme à la #guerre au #Yémen
    https://www.mediapart.fr/journal/international/220817/l-arabie-saoudite-pourrait-mettre-un-terme-la-guerre-au-yemen

    D’après des #emails qui ont fuité, le prince héritier saoudien #Mohammed_ben_Salmane souhaiterait s’extraire du conflit qu’il a déclenché et qui ne mène à rien, sinon à la multiplication des morts civiles, dont celles de nombreux enfants, comme le souligne un rapport de l’ONU.

    #International #Arabie_Saoudite #Houthis #ONU

  • Foiling Electronic Snoops in #Email - The New York Times
    https://www.nytimes.com/2015/11/19/technology/personaltech/foiling-electronic-snoops-in-email.html

    IT didn’t take much for Florian Seroussi, a technology investor in Manhattan, to become suspicious of his email.

    His misgivings were sparked late one night last year when he opened a message from an entrepreneur who was asking him to invest in a start-up. Minutes later, Mr. Seroussi’s cellphone rang with a call from the same start-up executive.

    Coincidence? Not to Mr. Seroussi. “What are the odds that at 10:30 at night, a guy suddenly has a vision that I’m reading his email?” he said. “They must know something that I don’t.”

    It turned out that the start-up executive had planted a tracking mechanism into his message to Mr. Seroussi, a trend that is increasingly afflicting all of our email. Trackers, which come in many forms including a single invisible pixel inserted into an email or the hyperlinks embedded inside a message, are frequently being used to detect when someone opens a message and even where that person is when the email is opened. By some estimates, trackers are now used in as much as 60 percent of all sent emails.

  • Les campagnes inspirantes et les dispositifs innovants de demain
    https://speakerdeck.com/hteumeuleu/les-campagnes-inspirantes-et-les-dispositifs-innovants-de-demain

    « Des e-mails accessibles aux e-mails interactifs, en passant par les dernières nouveautés CSS utilisables dans un e-mail, cette présentation vous propose un tour d’horizon du champ des possibles en matière d’email. »

    #email_UX_RWD_slides_clevermarks

  • PGP im Browser: Mailverschlüsselung per Plugin oder in der Cloud - Golem.de
    https://www.golem.de/news/pgp-im-browser-mailverschluesselung-per-plugin-oder-in-der-cloud-1701-125875.h

    Das Problem: Mal eben im Urlaub mit dem Webmailer die E-Mails abrufen, funktioniert nicht mehr, wenn man keinen eigenen Rechner dabeihat. Und den privaten PGP-Schlüssel seinem Android-Telefon anvertrauen oder einzelne E-Mails mit dem iPhone kompliziert zu entschlüsseln, ist meist auch keine Alternative.

    Es gibt jedoch Möglichkeiten, PGP-verschlüsselte Mails auch anders lesen zu können. Auch wer das Passwort für seinen PGP-Schlüssel vergisst oder wer keine Sicherheitskopie des Schlüsselmaterials hat, hätte in diesem Fall ein wertloses Mailarchiv. Zwei Angebote wollen helfen, diese Probleme zu adressieren.

    #Email

  • Typographic Email

    This is a #responsive #email template that is optimized for readability. This is used in my project - EmailThis. I created it because I needed a simple, minimal yet beautiful email template that focusses specifically on readability.

    source : https://github.com/EmailThis/typographic-email
    démo : https://rawgit.com/EmailThis/typographic-email/master/dist/kitchen_sink.html

    À intégrer dans le plugin Newsletter de #SPIP ?

  • Threat Group-4127 Targets Google Accounts | SecureWorks
    https://www.secureworks.com/research/threat-group-4127-targets-google-accounts

    The following types of individuals and organizations are at greatest risk:

    Russia subject matter experts
    Individuals and organizations that publish articles portraying Russia in a negative context
    Defense or government organizations
    Organizations and individuals involved in the government supply chain
    Former military or government personnel
    Individuals associated with U.S. politics

    Il s’agit du #hack qui a permis à #Wikileaks de publier les #emails de John Podesta, et dont Trump vient de nier qu’il s’agisse des Russes.

  • Ça sent le souffre chez #riseup · Aldarone.fr
    https://aldarone.fr/%C3%A7a-sent-le-souffre-chez-riseup

    Vu les nouvelles sur Riseup et vu que ça a pas l’air d’être le moment pour aller s’héberger chez eux, je fais un peu le point sur 3 alternatives qui m’ont l’air viables :

    Il est donc possible que Riseup efface les données en sa possession dans un futur plus ou moins proche. Ce n’est donc pas trop le moment de rejoindre leurs services. Et j’ai fait un compte chez eux HIER. Admirez mon timing. Alors du coup quelles sont les alternatives ? J’en ai vu trois qui peuvent faire l’affaire et que je vais présenter très succintement ici. > (Ce ne sont pas les trois seules alternatives qui existent, ce sont juste trois dont j’ai entendu parler qui m’ont l’air suffisamment sérieuse pour considérer de les utiliser quotidiennement.)

    -- (...)

    #communications #email #gag #privacy #surveillance #vieprivee #warrantcanary

    • disroot, avec toutes ces photos d’anonymous, de black bloc et de tags « revolution », on dirait un pastiche.

  • Sisimai | The successor to bounceHammer, Library to parse bounce mails | Sisimai : Mail Analyzing Interface

    http://libsisimai.org/en

    Sisimai is the successor of bounceHammer, is a Mail Analyzing Interface: a Perl module and a Ruby Gem for parsing RFC5322 #bounce #emails and for generating structured data such as #JSON.

    #postfix

    Pourrait être utile pour la gestion des bounces sur #seenthis ? ping @biggrizzly

  • Portier - An email-based, #passwordless authentication service

    https://portier.github.io

    Portier (pronounced “Por-tee-ay”) is a #self-hostable #login service that you can use instead of passwords. Portier sits between your website and third-party services like Google Sign-In to provide your users the fastest and easiest login experience, without ever needing a new password.

    Best of all, Portier works for everyone, because it can fall back to traditional “click the link” methods of #email confirmation.

    Portier is inspired by many projects and considers itself a spiritual successor to Mozilla Persona.

  • Have I been pwned ? Check if your email has been compromised in a data breach
    https://haveibeenpwned.com
    Voilà un petit receuil de comptes compromis. Tu peux y vérifier si ton voisin s’est inscrit auprès d’un service cloud hacké.

    152 pwned websites
    1,801,838,008 pwned accounts
    40,953 pastes
    33,465,022 paste accounts

    https://haveibeenpwned.com/PwnedWebsites

    Here’s an overview of the various breaches that have been consolidated into this site. Each of these has been dumped publicly and is readily available via various sites on the web. This information is also available via an RSS feed.

    https://haveibeenpwned.com/DomainSearch

    Domain search allows you to find all email addresses on a particular domain that have been caught up in any of the data breaches currently in the system.

    Là au moins il y a une protection.

    Before you can perform a domain search, you need to verify that you control the domain you’re searching. If you cannot verify that you control the domain, you will not be able to search for breached email addresses on it.

    #internet #email #séurité #pwned

  • Le #FBI relance l’affaire des #emails
    https://www.mediapart.fr/journal/international/291016/le-fbi-relance-l-affaire-des-emails

    Le FBI annonçait vendredi la possible réouverture d’une enquête sur la messagerie privée utilisée par #Hillary_Clinton quand elle était secrétaire d’État. À deux semaines du scrutin, le retour de la saga des emails peut fragiliser la candidate démocrate. « C’est extraordinaire qu’une chose pareille se produise à onze jours d’une élection présidentielle », a avoué son directeur de campagne. Chronique.

    #International #affaire_des_emails #Amérique_du_nord #élections_présidentielles_américaines

  • Le #FBI relance l’affaire des #emails
    https://www.mediapart.fr/journal/international/291016/le-fbi-relance-laffaire-des-emails

    Le FBI annonçait vendredi la possible réouverture d’une enquête sur la messagerie privée utilisée par #Hillary_Clinton quand elle était secrétaire d’Etat. A deux semaines du scrutin, le retour de la saga des emails peut fragiliser la candidate démocrate. « C’est extraordinaire qu’une chose pareille se produise à onze jours d’une élection présidentielle », a avoué son directeur de campagne.Chronique.

    #International #affaire_des_emails #Amérique_du_nord #élections_présidentielles_américaines

  • Admit It. The Clinton Email Controversy Bothers You, Yet You Don’t Actually Know What the Clinton… – The Curious Civilian – Medium
    https://medium.com/the-curious-civilian/admit-it-the-clinton-email-controversy-bothers-you-yet-you-dont-actually-kno


    C’est une explication plausible de Hillarygate écrit par quelqu’un qui ne cache pas sa sympathie pour elle. C’est le meilleur texte étatsunien à propos de la question que j’ai vu jusqu’à présent. Il devrait servir de guide à chaque politicien qui cherche à éviter des scandales.

    How a poorly explained mistake continues to threaten the political career of the former Secretary of State.
    Former Secretary of State Hillary Clinton, likely not thinking about emails.

    BY KEN CROSSLAND

    IT’S THE NEWS STORY that simply has no end. We’ve been assaulted by the Hillary Clinton email “scandal” all election season, but we have shockingly little understanding of what actually happened. Go from one source to the next, and you’ll hear various explanations on what really went down:

    She was openly and brazenly sharing vital U.S. secrets over regular-Joe email, secrets that hackers wanted to get their hands on. And maybe did.
    She was deleting thousands of emails to avoid being caught doing something.
    She was secretly hosting a server so that the public couldn’t pry into her affairs.
    She was exerting megalomaniacal control over all her communications in an attempt to protect her fragile public image.

    We have so many opinions about the Clinton email controversy, yet few of us, if really questioned about it, could adequately explain what the fuss is truly about. It doesn’t help that Clinton, herself, has been irritatingly evasive about the ordeal, letting anyone and everyone fill in the blanks for the public. And boy have they.

    Not to put too fine a point on it, but Americans hate Clinton’s email problem. In a recent poll about which issues voters disliked the most about the two remaining candidates, a whopping 80% of respondents said they were bothered by the email scandal, and of that 80%, 58% were really bothered by it. Conclusion? It’s a big problem for Clinton, and every time it comes up in the news cycle, it drags down her polls — enough that it could very well be threatening what should’ve been a slam-dunk win over Donald Trump.
    Okay, so what really happened?

    The Clinton email issue is a perfect confluence of inertia, bureaucracy, and the limits of technology in government. It was a bad solution to an even worse problem. How do you marry convenience, speed, secrecy, and accountability into one streamlined government communications package?

    You can’t.

    Let’s start from the beginning.
    Where Did Hillary Clinton’s Email Server Come From?

    Like most things bad in Hillary Clinton’s life, the email problem can be traced back to her husband, former President Bill Clinton.

    Post-presidency, Bill Clinton had an email server set up in their Chappaqua, New York, home to handle the communication needs of their foundations and other post-White House affairs. They felt that it was more reliable if they controlled their own server (which few would argue was a bad idea). An aide to President Clinton, Justin Cooper, set up the first email server on an old Apple computer in their basement, and away this whole thing went.

    Hillary Clinton, still senator and running for president, was generally doing her email on a Blackberry with an address she got from AT&T. If you think this is silly, remember that people like Colin Powell were emailing on AOL accounts — but more on that later.

    Recently sworn in as Secretary of State, Hillary Clinton decided to move from her AT&T account to the family server, which honestly, makes a lot of sense. If you had access to email that worked on whatever device you wanted to check it on, had near-perfect uptime, was siloed, and had support you knew personally (and could contact at any time), wouldn’t you consider using your own server too? When Hillary Clinton became Secretary of State, the server was in the process of being updated by Bryan Pagliano, who was recommended by Huma Abedin (Clinton’s longtime aide who many consider her closest). Within a few months (from January, to March 2009), Clinton and her staff were migrated to this server (clintonemail.com), doing work for the State Department.
    So all of the government’s most private secrets were being funneled through a private server in Chappaqua? Lock her up!

    In a word, no.

    While some classified information passed through Clinton’s servers, email isn’t generally the place where state secrets and strategies are talked about. For that, Clinton used secure methods like SCIFs, couriers, and other approved forms of transmission. And while classified messages did go through her private server, the hard truth is that the vast majority of them were classified after the fact.

    Classification is a strange beast in the government, and the rules aren’t exactly clear-cut. Classification, for the most part, is governed by a small set of guidelines, with human judgment being the most important criteria (if you want to really know more about the subject, check out this and this guide from the government itself — and be sure to enjoy the Microsoft Office clipart). The reasoning for classification doesn’t always have to be a great one— simply wanting to have something classified will generally do. In an age where terrorism and national security are such critical issues, you can imagine that more information than necessary might be considered sensitive, which has actually led to a major problem in over-classification.

    Does this forgive Clinton for having any classified data on her server? No. But she also wasn’t actively trying to use her email for that purpose, and she followed proper state guidelines with information she knew was sensitive.
    So level with me. How many classified emails went through this server?

    2093.

    2093? Holy shit.

    Hold on, that’s 2093 out of 62,320.

    Still a lot.

    Yes, but out of that 2093, only 110 were classified at the time. 0.17%, or just under two-tenths of a percent.

    Still kinda bad that it was on a private server.

    Yeah, pretty much, but look at it this way. Even if she used a state account, that percentage would be identical, and state accounts are not immune to security breaches. While hosting it on her own server wasn’t the smartest move by Clinton, you can hardly call it malice. It makes James Comey’s conclusion, which was that “no reasonable prosecutor” would bring a case against Clinton, seem perfectly sound. There’s really nothing there.

    Yeah, but some classified information being shared is disastrous, right?

    Maybe, but Clinton wasn’t even close to being alone. The Washington Post reported in 2015 that one in three government employees were using personal email addresses to conduct business. This quote from the article (emphasis mine) really illustrates where the security/convenience issue breaks down:

    “The record keeping rules are unfortunately not known by everyone at an agency,” he said. And the flexibility of telework makes it easier for employees to skip the step of signing into a government account remotely if using, say, Gmail is simpler.”

    The sad truth is that security isn’t a sure thing in government communication, and that it generally lags heavily behind the public sector. We like to think that digital correspondence in the government is happening over some bank vault-like super networks, but many times it’s just an iPhone and a Hotmail account.
    So why on earth did she do this?

    Clinton’s email server, running from Chappaqua, was tasked to handle the tens of thousands of her work-related emails, as well as all of Clinton’s personal correspondence. If you’re thinking it was a mistake to combine the two, you’re totally right. Citing her busy life and convenience, Clinton wanted everything to be consolidated into one easy to access address, preferably from the device of her choice (Clinton didn’t like to use computers, and leaned on Blackberrys or the occasional iPad). The state offered a mobile device, but it couldn’t have her personal email, so that was that. So for four years, Hillary Clinton did her work-related state business on her private server, with no one really caring.

    Why didn’t they care, you ask? The constant term thrown around is that Clinton was running a secret email server, but this couldn’t be farther from the truth. Hillary Clinton’s email address was visible to anyone who received a message from her — or anyone on her staff. The idea that this was some clandestine move by Clinton to maintain secrecy is nonsense. It was merely ignored, or at worst, tolerated. [email protected] was the address from which every email was sent, with no attempt ever made to obscure this.

    Only Hillary Clinton really knows the exact reason she kept using her own server, but looking at the evidence, here are the likely two reasons she did it.

    1. Inertia

    She was already using private email before she was Secretary of State, and never thought about stopping. It was easy, available, and functioned as expected on all the devices she wanted to use it on. It was also hers. Hillary Clinton operates in the Clinton bubble, and it likely didn’t occur to her that having a private email server was anything out of the ordinary — if she even bothered to stop and think about it in the first place. When you’ve been in the public sector as long as the Clintons have, I’d imagine the lines between government and personal become blurred. To Hillary Clinton, she is the government, and this is perhaps the number one reason why the email server raised no flags in her eyes.

    But even more than that, Hillary Clinton isn’t a technophile. She viewed her set-up as a means to an end. Was it working? Great. Did she care how it worked? No. It’s likely as simple as that.

    2. Efficiency and speed

    The dirty secret in government? Their email isn’t always reliable, and as we learned from above, one in three employees will conduct at least some business from their own accounts. While it’s for sure different that Clinton had her own set-up, is it truly any worse? There’s been a concerted effort to paint her private server as something more nefarious than using Yahoo, but is it really? Both are mistakes, and frankly, classified information appearing on either is a disaster waiting to happen.

    But yet government employees are constantly doing this, with no end in sight. People want to use their own devices. People want something they’re familiar with. People want something that works anywhere and everywhere. The fact that people use their own solutions means the government isn’t providing an adequate version of their own.
    The Changing Nature of Email and Digital Communication

    While we could sit here and blame government IT all day for these failings, it’s shortsighted and doesn’t really cover the main issue surrounding Clinton’s email controversy. The truth is, for better or worse (and I’d wager to say better) email has gone from being a digital approximation of real, official mail to a rapid form of messaging between private parties. It’s become a way for people to deliberate in a closed setting (aside from possible hacking, of course), with formality taking a backseat.

    So what’s the problem with that? Well, our record-keeping rules don’t reflect this shift. We still force government employees to print and save all emails as if every message was a tablet handed down from Mount Sinai. It’s an open secret in the fourth estate that when you solicit comments from a government source, more often than not you’re going to get it over the phone. Why? So they can circumvent the important, but overly onerous rules of the Freedom of Information Act. Sometimes what you need to say is off-the-cuff and unofficial, or even more so, not-quite fully-formed for public consumption. There’s a fine line between accountability and having the freedom to throw ideas around, and we just don’t have a great solution yet.
    So was Clinton using private email to avoid public accountability?

    Very likely, no, but unfortunately for Hillary Clinton, this is another murky area in the controversy.

    Clinton was under the impression that as long as she was emailing people with “.gov” addresses for official business, record keeping would take care of itself. Obviously this doesn’t quite hold water, since emails solely written between clintonemail.com addresses wouldn’t fall under that umbrella, and therefore wouldn’t be automatically captured.

    However, after her term did end, Clinton and her team did make a substantial effort to get her messages into the public record. The State Department, noticing gaps in their files, actually sent official letters to former Secretaries of State Madeleine Albright, Colin Powell, Condoleezza Rice, and Hillary Clinton, asking for additional records. In response, Clinton and her team released 55,000 pages of emails that were related to her time at State. After separating her personal from her work emails, and complying with FOIA, the team asked what she wanted to do with the personal ones. Not surprisingly, she said she didn’t need them anymore, and they were deleted.
    She was deleting emails! What was she hiding?

    As we talked about earlier, Clinton — as well as most of the technologically up-to-date world — has a different relationship with email than we did in the past. She probably genuinely thought that old, personal emails were like obsolete conversations, and not worth archiving. I mean, how do you personally handle your emails? I generally read something, respond, and get rid of it unless it contains something I might need later. That means I’ve likely deleted thousands of emails in my lifetime, and I don’t think anyone would consider me deceptive for tossing an old newsletter.

    Now I understand we’re veering into false equivalency by comparing my inbox full of cat GIFs with the server of the highest ranking member of the State Department, but communication is communication. In 2016 we expect things to happen immediately, and in the fast-paced world of diplomacy, where life-and-death decisions need to be made in an instant, we’re left with a massive divide between doing urgent business, and doing that business with perfect safety and transparency. Clinton’s email server is the product of this gap, and instead of asking ourselves what led to this foolish skirting of protocol, we waste our time with far-fetched, politically motivated conspiracies.
    So what could Hillary Clinton say to help squash this email problem?

    It for sure doesn’t help that Hillary Clinton seems almost congenitally unable to explain this controversy away. It’s well-documented that she loves her privacy, but avoiding the issue has nearly wrecked her political ambitions.

    What could she say to make Americans understand? It took me nearly 2,000 words to explain the situation, so clearly this isn’t soundbite material. But here’s what she might be able to get across:

    “I used an email server that my husband started to manage his organization. It was very reliable, and I liked that it worked on my favorite phone.”
    “I sort of just forgot that we were using it because it worked so well, and it was easier than what the government offered. We tried to make sure that no classified information ever passed through the server, but we messed up badly. We shouldn’t be forgiven for that lapse.”
    “I should’ve worked better with the State Department to find a better solution. I let my desire for convenience override my judgment.”
    “As president, I want to revamp our technology so that we can have more secure government communication that’s fast, as easy to use as Gmail, and can easily be added to the public record when necessary.”
    “I’m really sorry, and I deserve every bit of the flack I’ve gotten for this.”

    So basically, admit, admit, admit, commit to a better solution that makes Americans more secure, and fall on your sword. Why Clinton hasn’t done this herself is almost too strange to believe.
    What do you personally think about the whole thing?

    I think Hillary Clinton has operated in the upper-stratosphere of public life for so long, that I generally feel like she doesn’t quite understand the optics of everything she does. She’s obviously a very smart woman, but the cocoon of government and power seems to have skewed her perspective on what the public does and doesn’t deserve to know. I’m pretty convinced, viewing the evidence, that Hillary Clinton believes she’s in the right with her email server, that it helped her do her job well, and that it kept America safe. What irks the public is that we know that she knows that we know that Clinton doesn’t actually care that she used a private server, and the only thing she laments is that it blew up in her face. You can almost hear her eyes slam to the back of her skull when she rolls them at an email question. She knew better, and wishes we could see that, too.

    This controversy has been so damaging because it amplifies everything we already don’t like about the Clintons. In the 30-plus years that Bill and Hillary have been in the public eye, we’ve bristled at the way transparency always seems to be an inconvenience to them. They constantly want to work for the public, yet lose their shit when that same public wants accountability. We’re well beyond “right-wing conspiracy theory” now. The Republicans are successful at branding Hillary Clinton as an insider because, quite frankly, her approach with the public has been to effectively shut them out. Sometimes you have a reputation because you’ve earned it.
    So how did I come across all this information?

    I’ll bet you’re wondering how I was able to compile so much data on the Clinton email controversy. Easy. It all came from the FBI themselves. The report is available for anyone to read at any time, and it clearly lays out the investigation that went down, as well as why they came to their conclusions.

    Clinton’s emails are the result of a lot of things, but criminality isn’t one of them. The government needs a serious revamping of their communications systems, their transparency, and a clearer grasp of just what workers in 2016 are expecting — and needing — from the tools that help them do such important state business.

    Let’s be frank, here. America is the number one military superpower in the world. Our national security relies on finding a solution to this critical communications need. That the acting Secretary of State relied on a private server to do her job—and do it better — should be scaring the hell out of all of us. But instead of looking at — and fixing—this monumental problem, we’re spending our time trying discredit a woman, who despite what you think about her personally, has actually been an effective and diligent public servant.

    The Clinton email controversy isn’t about Hillary Clinton. It’s not about classified information. It’s about how we, as Americans, adapt to the changing world. As the pressures of globalism escalate, there’s no better time — and no better person than Clinton herself — to mount this charge. She needs to do something about our communications problem, and we need to hold her to it.

    #USA #Email #politique #elections

  • Les serveurs mail de Microsoft n’acceptent pas d’emails envoyés par de nouveaux serveurs.
    https://mail.live.com/mail/troubleshooting.aspx#errors
    Il ne suffit plus de configurer correctement son serveur mail, il faut en plus l’inscrire chez MS.

    Senden Sie E-Mails über eine neue IP-Adresse?
    IP-Adressen, die bisher noch nicht für das Senden von E-Mails verwendet wurden, verfügen in unserem System noch über keinerlei Eintragungen zur Zuverlässigkeit. Daher können bei E-Mails, die von neuen IP-Adressen gesendet werden, mit höherer Wahrscheinlichkeit Zustellbarkeitsprobleme auftreten. Nachdem sich die IP-Adresse durch das Nichtversenden von Spam als zuverlässig erwiesen hat, wird in Outlook.com in der Regel eine bessere Zustellbarkeit für E-Mails erreicht.
    Neue IP-Adressen, die für Domänen hinzugefügt werden, die über vorhandene SPF-Einträge authentifiziert wurden, übernehmen in der Regel einen Teil der Sendezuverlässigkeit der Domäne. Wenn die Domäne über eine gute Sendezuverlässigkeit verfügt, ist für neue IP-Adressen möglicherweise eine schnellere Anlaufzeit festzustellen. Eine neue IP-Adresse wird spätestens nach einigen Wochen vollständig akzeptiert. Ausschlaggebend sind hierbei jeweils das Volumen und die Listengenauigkeit – vorausgesetzt, es liegen möglichst wenig Junk-E-Mail-Beschwerden vor.
    Hinweis: Denken Sie daran, Ihr JMRP-Konto (Junk E-Mail Reporting Program, Junk-E-Mail-Meldeprogramm) mit den neuen IP-Adressen zu aktualisieren. Wenn Sie ein JMRP-Konto aktualisieren oder einrichten möchten, klicken Sie auf hier

    Dienste für Absender und Internetdienstanbieter
    https://mail.live.com/mail/services.aspx
    Comme tout est payant chez MS ils conseillent de souscrire un abonnemenet chez un service de maintien de réputation. Pourtant on peut effectivement s’en passer sauf si on est en train de monter un service de mailings commerciaux.

    Return Path-Zertifizierung
    Ein Akkreditierungs-/Reputationsdienst eines Drittanbieters mit dem Zweck, Absendern den Status eines sicheren Absenders zu verleihen
    Weitere Informationen finden Sie unter http://g.live.com/9wc9en-us/senderscore

    Wenn Hotmail Deine Mailserver abweist
    https://www.hagen-bauer.de/2015/10/hotmail-block.html
    Comment j’ai appris cette « nouvelle » ? Notre fournisseur de serveurs héberge des serveurs piratés et MS a mis sur ses blocklists de réseaux IP entiers.

    In unsere “Nachbarschaft” bei Hetzner gab es wohl einige SPAM Schleudern so das Hotmail ganze Netzsegmente auf eine “schwarze Liste” gestellt hat. Unsere Server selbst ist sauber.

    Nach etwas Suchen bin ich auf diese Seite gestoßen. Hier kann man beantragen das eine IP Adresse wieder freigeschaltet wird.

    La solution
    https://support.microsoft.com/en-us/getsupport?oaspworkflow=start_1.0.0.0&wfname=capsub&productkey=ed
    Il faut demander gentiment qu’ils vérifient un peu, et hop, quelques heures plus tard ca roule. MS réagit nettement plus vite et mieux que Google.

    Après (enfin, de préférance préalablement) il faut toujours installer les protocoles de vérification qui améliorent la fiabilité de la communication avec les grands fournisseurs de services email.

    RFC 7208 - Sender Policy Framework (SPF) for Authorizing Use of Domains in Email, Version 1
    https://tools.ietf.org/html/rfc7208#page-23

    SPF : FAQ/Examples
    http://www.openspf.org/FAQ/Examples

    Ubuntu+ISPConfig+DKIM | Howtoforge - Linux Howtos and Tutorials
    https://www.howtoforge.com/community/threads/ubuntu-ispconfig-dkim.72473

    DKIM-Patch 1.1.9
    https://blog.schaal-24.de/ispconfig/dkim-patch-1-1-9

    How Senders Deploy DMARC in 5-Easy Steps
    https://dmarc.org/overview
    Cette liste décrit les étapes essentielles pour transformer un serveur mail traditionnel en machine acceptée par la majorité de ses interlocutrices. Il ne faut jamais oublier que ce sont des conventions qui évoluent et ne sont pas parfaites du tout.

    DMARC has been designed based on real-world experience by some of the world’s largest email senders and receivers deploying SPF and DKIM. The specification takes into account the fact that it is nearly impossible for an organization to flip a switch to production. There are a number of built-in methods for “throttling” the DMARC processing so that all parties can ease into full deployment over time.

    1. Deploy DKIM & SPF. You have to cover the basics, first.
    2. Ensure that your mailers are correctly aligning the appropriate identifiers.
    3. Publish a DMARC record with the “none” flag set for the policies, which requests data reports.
    4. Analyze the data and modify your mail streams as appropriate.
    5. Modify your DMARC policy flags from “none” to “quarantine” to “reject” as you gain experience.

    dmarcian - SPF Surveyor
    https://dmarcian.com/spf-survey/rezo.net
    Pour finir on peut vérifier si on a tout fait dans les normes.

    rezo.net
    Warning present!
    A DMARC record was detected while looking for an SPF record. DMARC records must be located at “_dmarc.rezo.net”, and not directly at “rezo.net”.

    Record analysis:
    DNS-querying mechanisms/modifiers:

    The SPF record authorizes 8 individual netblocks using 3 DNS-querying mechanisms/modifiers. The maximum number of DNS-querying mechanisms/modifiers is 10.

    This record utilizes a small number of DNS-querying mechanisms/modifiers. No fixing is required. If this record is meant to be included by other records, consider reducing the number of DNS-querying mechanisms/modifiers (if possible) to keep total resource consumption low.

    Duplicate netblock authorization:

    The following netblocks have been authorized more than once. Duplicates usually indicate inefficient records or redundant “include:” mechanisms, and should be removed:
    netblock # of occurrences
    193.56.58.14/32 2

    Record flattening (experimental!):

    The dmarcian SPF Record Flattener (experimental!) rewrites this record by removing duplicate netblocks, collapsing any overlapping netblocks, and using 0 DNS-querying mechanisms/modifiers. Each SPF record is kept to less than 512 bytes to fit into a single UDP packet (assuming no other TXT records are sharing the DNS label).

    NOTE: this approach does not take into account administrative or domain boundaries, and is meant to show that “minified” SPF records are possible. The presence of unusual qualifiers, macros, and creative semantics will likely yield less than optimal results.
    domain record
    rezo.net v=spf1 ip4:91.194.60.0/23 ip4:185.34.32.0/22 ip4:193.56.58.0/24 ip6:2001:67c:288::/48 ip6:2a00:99a0::/128 ~all

    #internet #email #SPAM #authentification

  • gmx.de und web.de haben Mail-Rejects durch SPF
    https://www.heinlein-support.de/blog/news/gmx-de-und-web-de-haben-mail-rejects-durch-spf


    Comment vivre avec les attitudes aléatoires des admins des géants du net quand tu n’est qu’un pauvre admin d’associations à but non lucratif. La gestion d’un serveur mail devient de plus en plus difficile à cause de la multiplication des méthodes employées contre le SPAM et surtout à cause de leur interprétations et implémentations différentes chez les grands fournisseurs de services mail.

    SPF „Bullshit und Broken by Design“
    Wer „-all“ einträgt muss mit Mailverlust leben wollen
    Absender können immer auch von anderen Mailservern kommen

    Warum SRS das Problem nicht löst
    1. Es gibt keine funktionierenden direkten SRS-Implementierungen in SMTP-Standardsoftware wie Postfix. Obwohl seit 10 Jahren immer wieder nachgefragt, hat Postfix-Erfinder Wietse Venema diesbezügliche Ansinnen stets abgelehnt. Kurz gefaßte Begründung: Weil’s Bullshit by Design ist und er kein Bullshit by Design implementiert. -Dem kann man nur zustimmen.
    2. Unklar ist, wie bei mehrfachen Weiterleitungen zu Verfahren ist. Was passiert, wenn der Empfänger bei B seinerseits auf Domain C weiterleitet? Zugegeben: Grundsätzlich kann diese SRS-Umschreibung immer wieder erfolgen. Aber praktisch bricht hier bei Kettenweiterleitungen über kurz oder lang das Chaos aus.
    3. Wie und auf welchen Weg sollen Bounces und andere Unzustellbarkeitsmeldungen „rückabgewickelt“ werden? Soll die Kette rückwärts wieder aufgedröselt werden?

    La raison pour le choix de SPF chez GMX et WEB.DE n’est pas intelligible.

    Warum machen GMX und web.de das?

    Tja, die Frage ist schwierig zu beantworten. Irgendwie hat SPF bei GMX und (weil es der gleiche Konzern ist) bei web.de einen guten Stand. Schon vor knapp 10 Jahren gab es am Rande des Anti-Spam-Summits des IT-Branchenverbands ECO im Schloß Biebrich Wiesbaden beim Social Event mit Rotwein und Fingerfood in der hessischen Staatskanzlei eine hitzige Diskussion zu SPF zwischen acht Postmastern der großen Provider, der ich beiwohnen durfte (naja: ich habe sie angezettelt). In Sachen SPF gab es nur einen einzigen Führsprecher: der Kollege von GMX. Und der beendete die durchaus sehr kompetent geführte Fachdiskussion nach einer guten Dreiviertelstunde mit den für mich unvergesslichen Worten: „Ja, SPF geht nicht, wir machen es aber trotzdem!“ Wirklich so gesagt und geschehen. Und da kann man dann nicht mehr diskutieren oder irgendwas verstehen wollen.

    Seitens GMX und web.de wird vermutlich auf SRS verwiesen und die Schuld (fast allen) anderen Providern zugeschoben, die halt bitteschön SRS hätten implementieren sollen. Nun, das ist ein Standpunkt und deren gutes Recht. Jedoch nicht viele Kollegen und Mailserver-Experten teilen diese Auffassung.

    Pourtant il y une solution mais elle n’est pas aussi simple à gérer que SPF.

    Was wirklich hilft: DKIM

    Die ganze leidige SPF-Diskussion ist vor allem deshalb so frustrierend, weil mit der Technik „Domain Keys Identified Mail“ (DKIM) eine Lösung zur Verfügung steht, die ebenfalls den Mißbrauch von Absendern wirkungsvoll einschränken kann (und nebenbei sogar noch die Unverfälschtheit der Mail sicherstellt). DKIM führt dazu eine Crypto-Signatur im Mailheader ein, also eine digitale Unterschrift des Mailservers. Dieser DKIM-Header ist nicht an die IP-Adresse gebunden und bleibt auch bei Weiterleitungen problemlos erhalten, solange die Mail unverändert ist (und das ist ja sehr positiv). Ähnlich wie beim SPF-Record kann der Domainbesitzer auch hier über DMARC festlegen, dass seine Mails wirksam DKIM-signiert sein müssen und wie mit Mails zu verfahren ist, denen diese Signatur fehlt. Mehr dazu im unten genannten Vortrag von uns.

    infos supplémentaires

    Sender Policy Framework
    https://en.wikipedia.org/wiki/Sender_Policy_Framework

    SPF Query Tool
    http://www.kitterman.com/spf/validate.html

    How To Implement SPF In Postfix
    https://www.howtoforge.com/postfix_spf

    DomainKeys Identified Mail
    https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail

    Ubuntu+ISPConfig+DKIM | Howtoforge - Linux Howtos and Tutorials
    https://www.howtoforge.com/community/threads/ubuntu-ispconfig-dkim.72473

    ISPConfig – DKIM-Patch 1.0 – florian @it
    155 Gedanken zu “ISPConfig – DKIM-Patch 1.0”
    https://blog.schaal-24.de/ispconfig/dkim-patch-1-0

    How to send emails properly – florian @it
    https://blog.schaal-24.de/mail/emails-richtig-versenden/?lang=en

    #internet #email #SPF #DKIM #DMARC