• 3 Posts
  • 291 Comments
Joined 11 months ago
cake
Cake day: July 23rd, 2023

help-circle
  • shrugal@lemm.eetoSelfhosted@lemmy.worldSimple mail server
    link
    fedilink
    English
    arrow-up
    8
    ·
    edit-2
    19 days ago

    I agree with everyone here that self-hosting email is never easy, but if you still decide to go down this route then here are two tips that I personally found very helpful, especially when you decide to host it at home:

    The first is to get an SMTP relay server. That’s just another mail server that yours can log into to actually send its mail, just like an email client would. That way you don’t have to worry about your IP’s sending reputation, because everyone will only see the relay’s reputable IP.

    Second is to configure a Backup MX. That’s an additional MX DNS entry with lower priority than the primary, and it points to a special mail server that accepts any mail for you and tries to deliver it to the primary server forever (or something like an entire week). So when your primary server is unreachable other sending servers will deliver mail to the backup, and it delivers the mail to the primary as soon as that’s back online.

    You can get these as separate services, but some DNS providers (like Strato for example) offer both with the base domain package. It makes self-hosting an email server much simpler and more reliable in my experience.

















  • Can’t talk for the free tier, but my Usenet account comes bundled with a paid Privado account, and that’s working ok so far. The connections have been reliable, fast, and low latency.

    My main issue has been that it doesn’t support port forwarding. Also, some GeoIP services locate many of their servers in the Netherlands, instead of where Privado says they are. Idk who’s right, but it’s definitely a problem if you want to pick a specific location.




  • Here is a more detailed explanation of the exploit.

    The Pepaire-Bueno brothers exploited a bug in MEV-boost’s code that allowed them to preview the content of blocks before they were officially delivered to validators, according to the indictment.

    The brothers created 16 Ethereum validators and targeted three specific traders who operated MEV bots, the indictment said. They used bait transactions to figure out how those bots traded, lured the bots to one of their validators which was validating a new block and basically tricked these bots into proposing certain transactions. […]

    So hardly an attack on any core system of cryptocurrencies.