On 07/14/2019 03:36 PM, Punk wrote:
On Sun, 14 Jul 2019 15:28:37 -0700 Mirimir <mirimir@riseup.net> wrote:
On 07/14/2019 02:19 PM, Punk wrote:
On Sat, 13 Jul 2019 22:57:11 -0400 John Newman <jnn@synfin.org> wrote:
And it didn't work very well in any case, the first line in the headers is
Return-Path: <nixen@cock.li>
.. which is my cock.li account :P
I will now stop abusing the mail system tonight.
so either somebody 'guessed' my random password, or somebody at cock.li is playing games. If it's Vince, then Hi Vince! and thanks for the service(not including impersonation)
Now _that's_ funny.
John didn't say that he compromised your CockMail account.
Right. And I never suggested or implied he did. So what are *you* suggesting?
He said that he just spoofed "headers".
Right. I never said or implied that he did anything else. I assumed that cock.li allowed spoofed headers, he tested it. So what are you on about?
But maybe you ought to pretend that someone did successfully spoof this message ;)
are you drunk?
so either somebody 'guessed' my random password, or somebody at cock.li is playing games. If it's Vince, then Hi Vince! and thanks for
No, but are you blind? You said this: the service(not including impersonation) It's not uncommon for email providers to allow spoofed headers.