How can an email forwarding service send email with a "From" from a domain they don’t control, and still pass SPF?

Let’s say:

alice@example.com sends an email to bob@bob.com.

Bob owns the domain bob.com but doesn’t manage an emailing server. Instead he uses an email forwarding service (provided by his registrar / DNS service, for example Cloudflare d… Continue reading How can an email forwarding service send email with a "From" from a domain they don’t control, and still pass SPF?

How can an email forwarding service send email with a "From" from a domain they don’t control, and still pass SPF?

Let’s say:

alice@example.com sends an email to bob@bob.com.

Bob owns the domain bob.com but doesn’t manage an emailing server. Instead he uses an email forwarding service (provided by his registrar / DNS service, for example Cloudflare d… Continue reading How can an email forwarding service send email with a "From" from a domain they don’t control, and still pass SPF?

Backup on a distant dedicated server, such that even if someone gets root / hacks my distant server, they cannot read the data

Let’s say we have:

a local computer (Windows or Linux)
a distant dedicated server with 2TB storage, running Linux

I’d like to do a backup my local computer’s data folder (1 TB) to the distant server (updated every week of a few GB), but … Continue reading Backup on a distant dedicated server, such that even if someone gets root / hacks my distant server, they cannot read the data

Is the IP address of the client present in the email headers for webmail services and for desktop clients?

When I receive an email sent by someone using a webmail service (e.g. Gmail, etc.), I can find the IP address of the sender’s email server in the email headers.
But do the email headers also contain the IP address of the desktop (client) c… Continue reading Is the IP address of the client present in the email headers for webmail services and for desktop clients?

How do very big companies manage their most important passwords / keys?

Third-party password managers such as 1password, etc. are useful for people, businesses, etc. to store passwords. But I bet Facebook, Google, Twitter and other super big tech companies don’t use such third-party services for their internal… Continue reading How do very big companies manage their most important passwords / keys?

Does photo fingerprinting (using metadata) allow to search all photos on internet made by the same user (privacy issue)?

Browser fingerprinting is well-known: since a client gives many HTTP attributes/Javascript attributes during a website visit, the probability that two users have the same exact values for all this parameters is very low, and … Continue reading Does photo fingerprinting (using metadata) allow to search all photos on internet made by the same user (privacy issue)?