Skip to content

Commit

Permalink
Update avoid-being-spammed-en.html
Browse files Browse the repository at this point in the history
  • Loading branch information
Darth-Coin authored Feb 22, 2024
1 parent a4b5cf5 commit 058c23c
Showing 1 changed file with 116 additions and 0 deletions.
116 changes: 116 additions & 0 deletions general/avoid-being-spammed-en.html
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,122 @@
<html lang="en">
<body>
<h3>Darth guide how to deal with spam emails</h3>
<p><img src="/assets/images/darth-spammers.jpg"></p>

<h3>SPAM - Don't FIGHT it, but silently AVOID it.</h3>
<p>Yes, if you &quot;fight it&quot; is getting aggressive and you will not get anywhere. Avoiding is the way, you pretend that their spam tactics worked on you, but in fact, you just throw it into a bin.</p>
<p>I was contacted by some of my readers and they asked me to write a guide about email spam, so here it is! Yes, many Bitcoin users, today are hit with a lot of spam and many of them are not so techy with this stuff and can get scared and don&#39;t know what to do.</p>
<p>I will try to give you some hints and simple solutions, that any normal user can do. I was doing 20+ years of Sys Admin stuff, including to deal with spammers on the email servers I was managing all these years.</p>
<p>Not everybody knows how an email system works, what is behind all the communication. I will try not to enter too much into technical details.</p>

<h3>First of all, let&#39;s categorize the spam, we have the following types:</h3>

<h3>a. Regular unsolicited email</h3>
<p>You receive shit load of messages with a lot of garbage. Mostly because you used always your regular email address to subscribe on many different websites and some of them leaked that address to spammers or simply you fall into a spam trap website.</p>

<h3>b. Impersonating email</h3>
<p>When your email address got into spammers hands / lists and is used as to be &quot;the sender&quot; (in the &quot;from&quot; field) of spam emails they send to other people. Be aware! Is also used to see if your email server is having in place a system of &quot;non-delivery-report&quot; and how is dealing with emails that have a &quot;trusted&quot;/&quot;whitelisted&quot; address in the &quot;from&quot; field.</p><h3>c. Phishing email</h3>
<p>Here are also 2 sub-categories: those who knows your real email address and those who just send to various possible emails of your domain (if you use a personal one).</p>
<p>These are sent to fool you into clicking the links in the body of the message. All will look almost as the real senders, usually famous Bitcoin services that you possibly used. They don&#39;t know it yet, but they try to find out by making you to click on them. Almost all of them are redirecting to weird links address or trying to fake the real one, by changing/omitting a letter things like this.</p>

<h3>d. Flood spam</h3>
<p>When your server is literally overwhelmed by a huge quantity of messages sent towards your server and is literally stuck. In this moment you are quite fucked, you are directly attacked, somebody really wants your server down.</p>

<h3>What to do?</h3>
<p>So what a simple user can do to protect himself from spam attacks, in special when is dealing with Bitcoin sites, exchanges, etc. ?</p>
<p>There are two levels to answer to this question: basic and advanced.</p>

<h3>BASIC STEPS (that any regular user can do):</h3>
<h3>Use aliases</h3>
<p>When you have to use an email address to register/subscribe on a website or service, ALWAYS use an alias.</p>
<p>An alias is like a secondary email address linked to your main mailbox. Is like a Bitcoin wallet, with various BTC address / UTXOs. So use a specific alias for each website/ service.</p>
<p>Example: to create an account on a BTC exchange, use <a href="mailto:&#101;&#x78;&#99;&#x68;&#x61;&#110;&#103;&#101;&#x2d;&#120;&#x2d;&#121;&#x2d;&#122;&#64;&#x79;&#111;&#117;&#x72;&#45;&#100;&#x6f;&#x6d;&#97;&#105;&#x6e;&#x2d;&#110;&#97;&#x6d;&#x65;&#46;&#99;&#111;&#x6d;">&#101;&#x78;&#99;&#x68;&#x61;&#110;&#103;&#101;&#x2d;&#120;&#x2d;&#121;&#x2d;&#122;&#64;&#x79;&#111;&#117;&#x72;&#45;&#100;&#x6f;&#x6d;&#97;&#105;&#x6e;&#x2d;&#110;&#97;&#x6d;&#x65;&#46;&#99;&#111;&#x6d;</a>.</p>
<p>Yes, you will say, but I use gmail/hotmail etc... Stop using those public hosted email services. Use them ONLY as a garbage collectors, or specific cases when you do not want to reveal your personal domain name, avoid identity or things like that. These public domain services use them only for PUBLIC shit, to keep your private shit, private.</p>
<p>Many of these public domain services also offer creating alias, some of them are paid extra services.</p>
<p>Using your own email domain name gives you more flexibility to control all these aliases, but be careful also WHERE you use it, not everywhere is good to use your personal email domain.</p>
<p>Another way is to use dedicated services that manage specific aliases and redirect all emails to your real email address. There are quite a bunch of them, maybe later, I will add a list of them here. Just search on internet &quot;email redirect alias&quot; and you will find them. Many are free, but be aware, some could be also spam gathering services.</p>
<p>So, organize your mailbox, with rules, that check the &quot;To&quot; field, containing your &quot;special&quot; alias and redirect those messages to specific sub-folders you create into your main Inbox. In this way you always know from WHO and to WHICH alias was sent a spam.</p>
<p>If you see that onto an alias you start receiving spams, you have two simple options:</p>
<ul>
<li>simply remove / delete that alias, if was used for non-important stuff</li>
<li>if is from important stuff, go to the website where you use it and change the email address with another alias. In the same time, inform the website owner about the leak. If the alias do not exit anymore, all spams will be sent into ether and/or rejected.</li>
</ul>
<h3>No images in email client</h3>
<p>Either you use a desktop or mobile email client, setup your client software to NOT download the images attached to a message.</p>
<p>Yes, there’s an option like that in any decent email client. And will protect you from downloading any bullshit image attached, that can be hidden and can be used as a tracking algorithm. Usually they put images on dedicated servers from where are downloaded and each download is a tracking of your IP, device, OS, software etc.</p>
<p>Also these images hide the real link behind, the malware link, that you will click it without knowing it and … voila, you get infected or traced.</p>
<p>You can click manually to download images from a trusted email sender, but not by default automatically to all.</p>

<h3>Password policies</h3>
<p>Do not use same password on all websites/services you use!</p>
<p>This is one of the most important and simple rule.</p>
<p>A simple way to manage multiple passwords (I know is hard to remember all of them), is to use a password manager. KeePass or BitWarden are really good and can be used totally offline, on multiple devices. These password managers also have integrated a password generator, easy to create new random passwords. Why is good to have random? Because you could not be &quot;mentally attacked&quot; and leak from yourself those usual password you generate yourself.</p>
<p>Online password managers are NOT reliable! Anything that is stored in somebody else server is NOT yours!</p>
<p>If you still want to save a login password in your regular browser, at least go to settings and set a strong master password to open that vault, temporary. Also, set your browser to NOT save any history, cookies etc in one session, so once you close the app, all remaining shit is wiped, so all possible little cookies that can still read those stored passwords are gone at restart. But not always works 100%. So store only those that you used mostly and are not so important.</p>

<h3>Limit your online presence</h3>
<p>Yes, why do you have to subscribe to all the shit available online?</p>
<p>Limit your presence of giving your information (even if is a fake/nym one) to useless shit you find online.</p>
<p>Stop participating in useless quiz, voting, petitions, polls, questionnaires. Or at least select them and try to use more those without giving an email address. If something is promoted as &quot;free stuff&quot; just submit your email here... that means in almost all cases: gathering user data. Free stuff is NEVER free.</p>

<h3>ADVANCED STEPS (for users with some more tech skills and knowledge)</h3>
<h3>Use your own hosted domain and/or email server</h3>
<p>This is quite advanced but with some basic learning you can do it even if you are not a Sys Admin.</p>
<p><strong>Option A - your domain, but not your server</strong></p>
<p>You can only buy your own domain.com and host the email server in a VPS, there are many cheap services like that and with few simple clicks you have your own email server ready.</p>
<p>Yes, this will be managed by somebody else, but you can control at least the software and configuration, exactly as you need it.</p>
<p>There are many email solution available, I will not name them here, choose the one that suit more for your use. Important is that you have more flexibility to manage your own multiple mailboxes, aliases, access, private and encrypted email etc.</p>
<p><strong>Option B - your domain, your server</strong></p>
<p>This one require more tech skills, to install, manage and maintain security of a real server for your domain and email system.</p>
<p>With this one you could even be an email provider for your family and friends.</p>
<p>A simple email server like that could be even a NAS (Network Area Storage) like <a href="https://qnap.com/">Qnap</a> or <a href="https://synology.com/">Synology</a>. Look up into their app packages, they have a simple solution for a home user email server. <a href="https://www.xeams.com/qnap.htm">For example Xeams</a> is very easy to install and configure with a QNAP NAS. Are many other email server apps out there.</p>
<p>If you want a more robust, advanced email system, then install one in a Linux machine, with specific software as email server. Again, there are many to use, some more advanced than others. Many are free to use.</p>
<p>For Windows machines, I would recommend a very simple one <a href="https://www.mailenable.com/">MailEnable</a>. In just few clicks you have an email server on your regular Windows machine, with webmail and also access from various devices and clients.</p>
<p>Yes, this option (your domain / your server) require some more skills in networking, OS, how email system works, domain management, security, firewalls etc.</p>
<p>But don&#39;t be scared! Read more documentation and you could have your own server, even at your home, with your regular internet connection. Yes, with simple security steps you could have a secured server, there&#39;s nothing to worry on that.</p>

<h3>Detect the real sender</h3>
<p>When you want to create a spam list to blacklist all specific senders, you will need to find out first, WHO send it. Don&#39;t be fooled by what you see in your email client as &quot;from&quot; field. It can be anything that contain a @ there.</p>
<p>So open that message item and go to message properties. It will open the email header information panel.</p>
<p>There you can see the REAL communication that happen:</p>
<ul>
<li>the real server name / IP that sent that garbage</li>
<li>the real domain name that was used to send that spam. Not always is the same as &quot;sender&quot;. So that is an indication that the &quot;victim&quot; domain was hacked and their server is used as &quot;source&quot;.</li>
<li>the email address used as the sender</li>
<li>the possible re-routing servers, yes sometimes could be multiple hops to &quot;fool&quot; your weak server anti-spam policies</li>
</ul>
<p>So write down all these details and/or make a simple list, a text or a csv so later you could import them all into your server anti-spam policy filters.</p>

<h3>Organize your spam policies</h3>
<p>Now is time to get rid of these garbage spams.</p>
<p>So depending on the system you use, you will have to create specific blacklists and whitelists.</p>
<p>Also is good to have in place a <a href="https://learn.microsoft.com/en-us/exchange/mail-flow/non-delivery-reports-and-bounce-messages/non-delivery-reports-and-bounce-messages?view=exchserver-2019">NDR system</a>. NDR = non-delivery response.</p>
<p>There are vary ways to use NDRs:</p>
<ul>
<li>just silently discard the spams</li>
<li>move them into a specific mailbox / folder</li>
<li>mark them as &quot;spam&quot; so the user can be visually alerted first time will see it in his inbox</li>
<li>reply to the sender with a specific message. I usually reply with: &quot;please send me 100k sats to following LNURL, in order to have your spam emails not treated as such&quot;. Choose wisely the correct error NDR code from the 5.x.x !</li>
</ul>
<p>Create whitelists. Yes is a good practice to add the domains and other servers IPs that you trust to receive emails from, into a whitelist.</p>
<p>Also some email server software are coming directly with online spam lists filters like Barracuda, SpamHaus, SORBS etc so using whitelists, will avoid these spam filters to reject valid emails to be received.</p>

<h3>Configure your email server</h3>
<p>Yes, is very important the aspect of configuring properly all your email domain settings: MX records, DMARC, SPF, DKIM etc are very important so other servers will not reject your emails because of wrong /invalid/ non-existent sender.</p>
<p>A very good tool to use in this case is <a href="https://mxtoolbox.com/">MXToolbox</a>, so you can check your settings and also the blacklisted IP (if there&#39;s is)</p>
<p>Also be careful with configuring ports open for your server, if you host it in your home, so you will need full access to your home internet router and manage the ports.</p>
<p>A good tool to use in this case is <a href="https://ping.eu/">PING</a>.</p>
<p>Watch out to not be blacklisted!</p>
<p>Yes, if you use a shared domestic IP from your ISP, it could be previously used by other spammers or malware in some computers to send massive spam. Automatically at high levels that IP will be blocked.</p>
<p>But don&#39;t worry there are tools to unlock it at your level (not ISP level) and you can always inform your ISP about that and is their duty to unblock it (in the end they provide it to you and you pay for it).</p>
<p>Anyways, this do not exclude you from keeping your own network clean:</p>
<ul>
<li>all users connecting to your LAN or server, must have clean PCs and be aware of malware that can use their machines to send massive spam, in the background.</li>
<li>keep your server clean, don&#39;t use it for your regular browsing stuff.</li>
<li>If somebody alert you that they can&#39;t receive emails from you, you can check on MXToolbox and take the measures for it, following the instructions.</li>
<p>So far... this could be some basics steps to do. Of course there are many advanced things to explain, but this guide is only to offer you a starting point for to learn more and protect yourself.</p>
<h3>Knowledge is power! Control it.</h3>

</body>
</html>
</article

0 comments on commit 058c23c

Please sign in to comment.