DKIM adoption is a good example why stuff like this should be an ISO standard rather than RFC which is more like a recommendation... Microsoft Exchange for example doesn't even support DKIM... If DKIM was part of an ISO Microsoft could not afford to ignore it. Back in the days RFCs were taken more seriously, but these days the big players rather try to push their propreitary solutions, ignoring RFCs (the boycott of IMAP IDLE would be a good example).Gmail basically does that now. As of recently if a sender doesn’t have a good SPF record at the very least, the email is flagged. DKIM is preferred. Unfortunately DKIM adoption seems slow even now that SPF has finally caught on.
Between Google and Microsoft that’s 90% of (business) email, which is pretty close and as good as we can get in this duopoly system.
Unfortunately it seems like e-mail is fundamentally not designed for what we’ve made it into. Hard to believe that in the year 2022 communications are still so fragmented. I do like the federated nature but it seems it’s doomed to consolidation like everything else.
No we don't want Apple (or any other big company) to replace IMAP or SMTP or HTTP. Those are the last three major open protocols left that are widely supported, even by the monopolies in email (Microsoft and Google). We should be encouraging their use to keep the Internet open, rather then siloed. Do you want what happened to chat to happen to email? In the past there were open chat standards like XMPP, well just a few days ago Google shutdown Google Talk which supported XMPP, the last widely used chat service to support XMPP. Now you have to decide to use Facebook Chat, Google Chat, Skype, WhatsApps, LINE, etc etc.. all which are siloed and don't communicate with each other or can be run on-premise in your own datacenter. You know how annoying it is for me as a Android phone user when someone uses iMessage to send me something that is not supported in my normal SMS app. I wish Apple would support RCS.Apple (or the IETF) needs to replace IMAP. It was written for another age, and it's way long in the tooth.
Basically, security needs to be baked in instead of security as an afterthought. Verified senders needs to be a part of the infrastructure. It's ok to have unverified senders, but they should be marked as-such.
These days, certs are free and processing power is cheap, so issuing everyone a cert and using them for validation shouldn't be as much of a burden as it was back in the day.
Most companies will quickly discover if a hacker is using their own email to send emails to trick end users. It could be a problem but do not let perfection be the enemy of good.This sounds like a step in the right direction against phishing, but not perfect because socially engineered hacks towards the companies could still entrap end users (as they would then correspond with end users using legitimate email addresses)
This is a massive step in the right direction and will cause a LOT of scammers to think twice and have to try to think of new tactics which slows them down, in some cases even stop them.While I always welcome features that increase security or privacy, I don't think this will make much of a difference because inattentive or ignorant users are easily fooled by logo graphics attached by scammers to messages. Plus from a behavioral perspective, scammers rely on fear and greed emotions. The human fight-or-flight reflex means that red flags such as obviously bogus URLs, awful grammar, bizarre word choice, or a government agency asking for gift cards are all too often ignored or discounted.
Actually what you propose would not stop spoof emails one bit as security certificates can so EASILY be forged and faked.Not a fan of BIMI because it's once again not a solution, but just another overly complex workaround to fixing a broken system.
If all mail-servers required and enfored an organization validated server certificate for inbound connections from other servers the amount of spoofed mails and junk would be reduced by 99+%. Unfortunately, no mail provider can do that alone...
If that was about to be required by law, there would be an instant adoption and the problem essentially solved.
I've already been doing that for longer than most people are alive and they still think I am mad lolI have just made it a point NOT to click links in my email. Regardless what the email is about, if I want to check the account it was supposedly sent from, I go to the web page manually. Takes just a few seconds of extra effort, and it buys me 100% peace of mind.
This is why Apple will educate users with this feature which is a good thing in my view.This will provide an additional tool for those who are already cautious. Unfortunately, there are still far too many out there uneducated when it comes to phishing and the various scams utilized.
No, it is called business.Unfortunately in order to support this, on top of an https domain and the required DNS records, you have to get a bespoke "verified mark certificate" that signs the logo. There are currently only two options, costing between $1000-1500 per year. Feels like a scam.
Buy Verified Mark Certificates (VMC) or Common Mark Certificates (CMC) | DigiCert
Buy DigiCert Verified Mark (VMC) or Common Mark Certificates (CMC). Choose Verified Mark Certificate for registered trademarks and government seals or a Common Mark Certificate for trademarks protected by prior use.www.digicert.com
![]()
Verified Mark Certificates (VMCs) for BIMI | Entrust
Elevate your email communications with VMCs for BIMI. Showcase your registered logo in email avatars, enhancing brand visibility and credibility.www.entrust.com
If the companies participating in this know the pros and cons and still sign up, it's not scam.Unfortunately in order to support this, on top of an https domain and the required DNS records, you have to get a bespoke "verified mark certificate" that signs the logo. There are currently only two options, costing between $1000-1500 per year. Feels like a scam.
Buy Verified Mark Certificates (VMC) or Common Mark Certificates (CMC) | DigiCert
Buy DigiCert Verified Mark (VMC) or Common Mark Certificates (CMC). Choose Verified Mark Certificate for registered trademarks and government seals or a Common Mark Certificate for trademarks protected by prior use.www.digicert.com
![]()
Verified Mark Certificates (VMCs) for BIMI | Entrust
Elevate your email communications with VMCs for BIMI. Showcase your registered logo in email avatars, enhancing brand visibility and credibility.www.entrust.com
No they really can't... not sure if you may be confusing it with something else, but TLS OV Certificates are certainly not easily faked or forged. If they were, every HTTPS website would be insecure, which it isn't. The crypto is working.Actually what you propose would not stop spoof emails one bit as security certificates can so EASILY be forged and faked.
Well, IMAP has no much to do with this. It works well in displaying what was carried over SMTP in between mail servers. If anything, it is the SMTP protocol that should be reworked to include features you have mentioned - although many are already there as extensions (SPF, DKIM, DANE, MTA-STS), but there are so, so many broken and misconfigured system out in the wild, including from big players, it is close to impossible for this 40 year old protocol to evolve.Apple (or the IETF) needs to replace IMAP. It was written for another age, and it's way long in the tooth.
Basically, security needs to be baked in instead of security as an afterthought. Verified senders needs to be a part of the infrastructure. It's ok to have unverified senders, but they should be marked as-such.
These days, certs are free and processing power is cheap, so issuing everyone a cert and using them for validation shouldn't be as much of a burden as it was back in the day.
Not at all what I was trying to imply, I am always in support of progress!Most companies will quickly discover if a hacker is using their own email to send emails to trick end users. It could be a problem but do not let perfection be the enemy of good.