There have been a few different blog posts, Linkedin posts, and email newsletters talking about DKIM2 lately. And oof, most of them seem to get one or more of the details wrong. People mean well, so let's forgive them -- this is a complex thing, and it's easy to misunderstand what's going on. But I think we need a bit of better info out there.So, here I am, opening my own big mouth, explaining what DKIM2 is. The difference is, I'm actually one of the folks participating in the IETF working group process. I'm a little bit out on the edges in that I'm not necessarily writing code to define or unwind message-instance-tracked message modifications, but I'm observing what's going on, and doing so through the eyes of somebody with a strong email sender background.In this short (5 minute) video (embedded above or find it on Youtube), for the latest episode of Valimail's "Your Email Authentication and Deliverability Questions Answered" video series, I focus on what senders need to know and…
No comments yet. Log in to reply on the Fediverse. Comments will appear here.