Access 4: ARPA2 Access Control for Mail
We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!
>> Continue reading <<
We just demonstrated how you can configure access control in a local database. The next step is to actually put it to use. Lets control our email!
>> Continue reading <<
We are organising yet another ARPA2 All Hands meeting! This is scheduled to take place in Utrecht, the Netherlands on 25 June 2019.
>> Continue reading <<
We are organising the third ARPA2 All Hands meeting! This is scheduled to take place in Utrecht, the Netherlands on October 9th 2018. Thanks to SURFnet for kindly providing the venue for this event.
>> Continue reading <<
Mail was designed as a gullable system, and this is generally abused by spammers. Fighting spam is a balancing act between failures to accept and reject. With the more refined identity model of the IdentityHub, we have new tools to strike a better balance.
>> Continue reading <<
DKIM is the technology that signs a message and some of its headers at a mail server en route; mostly this is done by the originator of the email. One problem remains that slows down its introduction as a hard filter, and that is email handling that edits the message and then forwards it, as is common for email lists. This article nails the integration of DKIM with forwarding.
>> Continue reading <<