<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:admin="http://webns.net/mvcb/"
	xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
	xmlns:content="http://purl.org/rss/1.0/modules/content/">

	<channel>

	<title>&#45; CircleID</title>
	<link>https://www.circleid.com/blogs/</link>
	<description>Postings from  on CircleID</description>
	<dc:language>en</dc:language>
	<dc:rights>Copyright 2026, unless where otherwise noted.</dc:rights>
	<dc:date>2026-04-06T20:04:00+00:00</dc:date>

	
	<item>
		<title> Officially Compromised Privacy (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20151128_officially_compromised_privacy</guid>
		<link>https://circleid.com/posts20151128_officially_compromised_privacy</link>
		<description><![CDATA[The essence of information privacy is control over disclosure. Whoever is responsible for the information is supposed to be able to decide who sees it. If a society values privacy, it needs to ensure that there are reasonable protections possible against disclosure to those not authorized by the information's owner. In the online world, an essential technical component for this assurance is encryption. If the encryption that is deployed permits disclosure to those who were not authorized by the information's owner, there should be serious concern about the degree of privacy that is meaningfully possible. <a href="https://circleid.com/posts20151128_officially_compromised_privacy">More...</a>]]></description>
		<dc:date>2026-04-06T13:04:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Searching Under Lampposts with DKIM (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postssearching_under_lampposts_with_dkim</guid>
		<link>https://circleid.com/postssearching_under_lampposts_with_dkim</link>
		<description><![CDATA[Email is a complex service and email abuse adds confusing deceptions. Worse, like postal mail and even telephone service, Internet mail is inherently open, flexible and even anonymous, making things much easier for abusers. Bad actors hide their true identity and their true purpose. Most other communication tools for users also are also quite open, and problems with email are being replicated elsewhere, such as instant messaging and social media. <a href="https://circleid.com/postssearching_under_lampposts_with_dkim">More...</a>]]></description>
		<dc:date>2026-04-06T13:04:00-07:00</dc:date>
	</item>
	
	<item>
		<title> A Few More Thoughts on Email Authentication... errr... Trust (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/posts20090422_thoughts_on_email_authentication_trust</guid>
		<link>https://circleid.com/posts20090422_thoughts_on_email_authentication_trust</link>
		<description><![CDATA[Mike Hammer's thoughtful article, <a href="http://www.circleid.com/posts/20090414_thoughts_on_future_of_email_authentication/"> A Few Thoughts on the Future of Email Authentication</a>, should trigger thoughtfulness in the rest of us. Email abuse has been around a long time. Anti-abuse efforts have too. Yet global abuse traffic has grown into the 90+% range, with no hint of trending downward. The best we hear about current effectiveness is for last-hop filtering, if you have the money, staff and skills to apply to the problem... <a href="https://circleid.com/posts20090422_thoughts_on_email_authentication_trust">More...</a>]]></description>
		<dc:date>2026-04-06T13:04:00-07:00</dc:date>
	</item>
	
	<item>
		<title> Challenges in Anti-Spam Efforts (Featured Blog)</title>
		<guid isPermaLink="true">https://circleid.com/postschallenges_in_anti_spam_efforts</guid>
		<link>https://circleid.com/postschallenges_in_anti_spam_efforts</link>
		<description><![CDATA[Without commenting on the particulars as they relate to Goodmail -- especially since I am on the advisory board for Habeas, a competitor -- let me note that public discussion is largely missing the nature of the current Internet mail realities and the nature of the ways we can deal with them. There are two articles in the <a href="http://www.cisco.com/web/about/ac123/ac147/about_cisco_the_internet_protocol_journal.html">current issue</a> of the Internet Protocol Journal, of which <a href="http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_8-4/anti-spam_efforts.html">I wrote one</a>, that provide some useful background about this reality. Simply put, Internet mail needs to sustain spontaneous communications... <a href="https://circleid.com/postschallenges_in_anti_spam_efforts">More...</a>]]></description>
		<dc:date>2026-04-06T13:04:00-07:00</dc:date>
	</item>
	

	</channel>
</rss>