Is this actually practically achievable or mostly theoretical in a lab? Is it confirmed that the cops have actually managed to do this?
Sir. Haxalot
- 0 Posts
- 6 Comments
Sir. Haxalot@nord.pubtoMicroblog Memes@lemmy.world•gmail is the signal of the richEnglish
38·5 days agoIt’s probably what has surprised me the most about all this, how much has happened on free hosted email accounts.
I guess it means that privacy from human eyes (i.e. not automated scanning) is pretty good. Or Google/Yahoo is in on a conspiracy but I can’t imagine regular operations staff being made aware of it.
Indeed and the only thing I have ever seen a larger company running is Microsoft Exchange, but MS is actively pushing to cloud here. I also know a few people who work with Exchange and they kind of hate it.
The option has the traditional open source stack I guess with Postfix, Dovecot, Spamassassin, some Webmail client, and then you have to make sure that SPF, DMARC, and DKIM signing works… It becomes a lot so I understand why none willingly wants to deal with this. That said there are some more modern alternatives like Stalwart mail server that combines the first three services into one and something I’m considering to try out.
Sir. Haxalot@nord.pubto
Linux@programming.dev•Not Kidding! Bash Shell Manual is Part of Epstein Files 🫣English
23·6 days agoAt some point I saw images posted on what was supposedly Epsteins server setup, and given the disgusting shit they were up to it’s not even a little surprising he would keep it on hardware he fully controls. So of course there will be some technical documentation in there.
At the same time I’m kind of shocked how much of these emails happens on seemingly regular @gmail.com or @yahoo.com addresses.
I feel it’s very important to point out that specifically email is one of the most common things to outsource. Hosting your own email is simply one of the harder things to run on your own, having to deal with anti-spam measures, IP reputation tracking and the risk of other providers blocking you if one of your users are compromised and used to send spam.
My point being that yes, you are somewhat likely to use other Cloud products but it’s not a good indicator for how dependent the core business is on cloud providers.
Tracking specifically email is probably the best thing if your goal is to create an infographic where the dependence numbers are as high as possible though.


I feel personally attacked.