<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Sender Audit Blog</title><link>https://senderaudit.com/blog/en/</link><description>Recent content on Sender Audit Blog</description><generator>Hugo</generator><language>en</language><lastBuildDate>Mon, 04 May 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://senderaudit.com/blog/en/index.xml" rel="self" type="application/rss+xml"/><item><title>Email trackers explained: pixels, link wrapping, and privacy</title><link>https://senderaudit.com/blog/en/email-trackers-pixels-privacy/</link><pubDate>Mon, 04 May 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-trackers-pixels-privacy/</guid><description>&lt;p&gt;Every marketing email you receive likely contains one or more invisible trackers. They measure whether you opened the message, when, how many times, from which device, and which links you clicked. Here&amp;rsquo;s how it works - and how to do better.&lt;/p&gt;
&lt;h2 id="how-open-tracking-works"&gt;How open tracking works&lt;/h2&gt;
&lt;h3 id="the-spy-pixel-an-invisible-image"&gt;The spy pixel: an invisible image&lt;/h3&gt;
&lt;p&gt;The mechanism is straightforward: the sender inserts a 1×1 pixel transparent image hosted on their server. When your mail client renders the message, it downloads the image. The server records:&lt;/p&gt;</description></item><item><title>Shadow IT and Email: The Tools Sending on Your Behalf Without You Knowing</title><link>https://senderaudit.com/blog/en/shadow-it-email/</link><pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/shadow-it-email/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;, &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt;, and &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt;. Your email infrastructure is under control. Then one day, while analyzing your &lt;a href="https://senderaudit.com/blog/en/understanding-dmarc-reports/"&gt;DMARC reports&lt;/a&gt;, you discover dozens of unknown IPs sending emails on behalf of your domain. Not phishing - internal tools that nobody in IT ever approved.&lt;/p&gt;
&lt;p&gt;Welcome to the world of &lt;strong&gt;email shadow IT&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="what-is-email-shadow-it"&gt;What Is Email Shadow IT&lt;/h2&gt;
&lt;p&gt;Shadow IT refers to the use of technology services without explicit approval from the IT team. Applied to email, it&amp;rsquo;s extremely common: business teams configure SaaS tools to send emails from your domain without going through IT.&lt;/p&gt;</description></item><item><title>Email and DNS: Every Record You Need to Know</title><link>https://senderaudit.com/blog/en/email-and-dns/</link><pubDate>Sun, 26 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-and-dns/</guid><description>&lt;p&gt;DNS is the invisible foundation of email. Without the right records, your emails won&amp;rsquo;t be delivered, authenticated, or encrypted. Here are &lt;strong&gt;all the DNS records&lt;/strong&gt; a sending domain needs to know and configure.&lt;/p&gt;
&lt;h2 id="overview"&gt;Overview&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Record&lt;/th&gt;
 &lt;th&gt;Type&lt;/th&gt;
 &lt;th&gt;Role&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MX&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;MX&lt;/td&gt;
 &lt;td&gt;Where to deliver emails for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;SPF&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Who can send for your domain&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DKIM&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT/CNAME&lt;/td&gt;
 &lt;td&gt;Public key for verifying signatures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;DMARC&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;SPF + DKIM alignment policy&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;MTA-STS&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT + HTTPS&lt;/td&gt;
 &lt;td&gt;Enforce TLS encryption&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;TLS-RPT&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Reports on TLS failures&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;BIMI&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;TXT&lt;/td&gt;
 &lt;td&gt;Verified logo in the inbox&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;PTR&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;PTR&lt;/td&gt;
 &lt;td&gt;Reverse DNS for your sending IPs&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 id="mx-where-to-deliver-emails"&gt;MX: Where to Deliver Emails&lt;/h2&gt;
&lt;p&gt;The MX (Mail Exchange) record specifies which servers receive emails for your domain.&lt;/p&gt;</description></item><item><title>Email Headers Explained: From Received to ARC</title><link>https://senderaudit.com/blog/en/email-headers-explained/</link><pubDate>Mon, 20 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-headers-explained/</guid><description>&lt;p&gt;Email headers contain the complete story of a message&amp;rsquo;s journey: who sent it, which servers it passed through, whether authentication succeeded, and why it landed in spam. Knowing how to read them means knowing how to diagnose.&lt;/p&gt;
&lt;h2 id="how-to-access-headers"&gt;How to Access Headers&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Gmail&lt;/strong&gt;: open the email → ⋮ → &amp;ldquo;Show original&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Outlook&lt;/strong&gt;: open the email → File → Properties → &amp;ldquo;Internet headers&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Apple Mail&lt;/strong&gt;: View → Message → All Headers&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Thunderbird&lt;/strong&gt;: View → Message Source&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Or paste them directly into Sender Audit&amp;rsquo;s &lt;a href="https://senderaudit.com/header-analyzer"&gt;Header Analyzer&lt;/a&gt; for a visual analysis.&lt;/p&gt;</description></item><item><title>DMARC: Safely Migrating from p=none to p=reject</title><link>https://senderaudit.com/blog/en/dmarc-none-to-reject/</link><pubDate>Sat, 11 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dmarc-none-to-reject/</guid><description>&lt;p&gt;You&amp;rsquo;ve published your &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; record with &lt;code&gt;p=none&lt;/code&gt;. That&amp;rsquo;s a good start, but &lt;code&gt;p=none&lt;/code&gt; blocks nothing: fraudulent emails still get through. The end goal is &lt;code&gt;p=reject&lt;/code&gt;, and this guide walks you through the migration without breaking your legitimate mail flows.&lt;/p&gt;
&lt;h2 id="why-pnone-isnt-enough"&gt;Why p=none Isn&amp;rsquo;t Enough&lt;/h2&gt;
&lt;p&gt;With &lt;code&gt;p=none&lt;/code&gt;, you&amp;rsquo;re asking mailbox providers to &lt;strong&gt;do nothing&lt;/strong&gt; when an email fails DMARC. You receive RUA reports, but:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Emails spoofing your domain still reach inboxes&lt;/li&gt;
&lt;li&gt;Your domain can be used for phishing&lt;/li&gt;
&lt;li&gt;Google and Yahoo now require a published DMARC record, but the real benefits start at &lt;code&gt;p=quarantine&lt;/code&gt; or &lt;code&gt;p=reject&lt;/code&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="recommended-timeline"&gt;Recommended Timeline&lt;/h2&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Week&lt;/th&gt;
 &lt;th&gt;Policy&lt;/th&gt;
 &lt;th&gt;Goal&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;W1-W2&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=none; rua=mailto:...&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Collect reports, inventory sources&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W3-W4&lt;/td&gt;
 &lt;td&gt;Report analysis&lt;/td&gt;
 &lt;td&gt;Identify each source IP, fix SPF/DKIM&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W5-W6&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Test on 10% of traffic&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W7-W8&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Gradually increase&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W9-W10&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=quarantine; pct=100&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Observe for 2 weeks&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W11-W12&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=10&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Begin gradual rejection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W13-W14&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=50&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Scale up&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;W15+&lt;/td&gt;
 &lt;td&gt;&lt;code&gt;p=reject; pct=100; sp=reject&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Full protection&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;This timeline is indicative. The key is to &lt;strong&gt;never skip a step&lt;/strong&gt; without verifying that reports are clean.&lt;/p&gt;</description></item><item><title>Reading and Understanding DMARC Reports (RUA)</title><link>https://senderaudit.com/blog/en/understanding-dmarc-reports/</link><pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/understanding-dmarc-reports/</guid><description>&lt;p&gt;You&amp;rsquo;ve configured &lt;a href="https://senderaudit.com/blog/en/configure-dmarc/"&gt;DMARC&lt;/a&gt; with a &lt;code&gt;rua=&lt;/code&gt; tag and reports are starting to arrive. But what do you do with these often incomprehensible XML files? This guide teaches you how to read them, interpret them, and take concrete action.&lt;/p&gt;
&lt;h2 id="what-is-a-dmarc-rua-report"&gt;What Is a DMARC RUA Report&lt;/h2&gt;
&lt;p&gt;An RUA (Report URI Aggregate) report is an XML file sent daily by mailbox providers (Google, Microsoft, Yahoo, etc.) to the address defined in your DMARC record.&lt;/p&gt;</description></item><item><title>TLS and Email: Why SMTP Encryption Is Non-Negotiable</title><link>https://senderaudit.com/blog/en/tls-email-encryption/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/tls-email-encryption/</guid><description>&lt;p&gt;You may have seen a &lt;strong&gt;red padlock&lt;/strong&gt; in Gmail with the message &amp;ldquo;The sender hasn&amp;rsquo;t encrypted this message&amp;rdquo;. This means the email traveled in plain text between servers, without TLS encryption. In 2026, that&amp;rsquo;s a serious red flag.&lt;/p&gt;
&lt;h2 id="why-encrypt-emails-in-transit"&gt;Why Encrypt Emails in Transit&lt;/h2&gt;
&lt;p&gt;Without TLS, email content travels in &lt;strong&gt;plain text&lt;/strong&gt; between the sending and receiving servers. Anyone intercepting network traffic (man-in-the-middle attack, compromised ISP, public Wi-Fi) can:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Read&lt;/strong&gt; the entire message content&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Modify&lt;/strong&gt; the message in transit&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Extract&lt;/strong&gt; attachments, credentials, links&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;TLS encryption creates an &lt;strong&gt;encrypted tunnel&lt;/strong&gt; between the two SMTP servers. Even if intercepted, the traffic is unreadable.&lt;/p&gt;</description></item><item><title>Anatomy of a DKIM Signature: Every Field Explained</title><link>https://senderaudit.com/blog/en/dkim-signature-anatomy/</link><pubDate>Mon, 23 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-signature-anatomy/</guid><description>&lt;p&gt;You know that &lt;a href="https://senderaudit.com/blog/en/configure-dkim/"&gt;DKIM&lt;/a&gt; signs your emails. But what exactly is inside that &lt;code&gt;DKIM-Signature&lt;/code&gt; header? Let&amp;rsquo;s break down every field and follow the verification process from start to finish.&lt;/p&gt;
&lt;h2 id="a-real-dkim-header-dissected"&gt;A Real DKIM Header, Dissected&lt;/h2&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=example.com; s=selector2024;
 h=from:to:subject:date:mime-version:content-type;
 bh=2jUSOH9NhtVGCQWNr9BrIAPreKQjO6Sn7XIkfJVOzv8=;
 t=1714123456;
 b=dHJ5aW5nIHRvIHJlYWQgdGhpcyBzaWduYXR1cmU/IE5pY2Ug
 dHJ5IDspIFRoaXMgaXMganVzdCBhIGR1bW15IGV4YW1wbGU=
&lt;/code&gt;&lt;/pre&gt;&lt;h2 id="every-field-explained"&gt;Every Field Explained&lt;/h2&gt;
&lt;h3 id="v1-version"&gt;&lt;code&gt;v=1&lt;/code&gt;: Version&lt;/h3&gt;
&lt;p&gt;The DKIM protocol version. Only one version exists (&lt;code&gt;1&lt;/code&gt;), defined by &lt;a href="https://datatracker.ietf.org/doc/html/rfc6376"&gt;RFC 6376&lt;/a&gt;. This field is mandatory.&lt;/p&gt;
&lt;h3 id="arsa-sha256-algorithm"&gt;&lt;code&gt;a=rsa-sha256&lt;/code&gt;: Algorithm&lt;/h3&gt;
&lt;p&gt;Two elements combined:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Cryptosystem&lt;/strong&gt;: &lt;code&gt;rsa&lt;/code&gt; (most common) or &lt;code&gt;ed25519&lt;/code&gt; (emerging, &lt;a href="https://datatracker.ietf.org/doc/html/rfc8463"&gt;RFC 8463&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Hash function&lt;/strong&gt;: &lt;code&gt;sha256&lt;/code&gt; (standard) or &lt;code&gt;sha1&lt;/code&gt; (obsolete and vulnerable, do not use)&lt;/li&gt;
&lt;/ul&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Combination&lt;/th&gt;
 &lt;th&gt;Status&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Standard, recommended&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;rsa-sha1&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Obsolete, some providers reject it&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;code&gt;ed25519-sha256&lt;/code&gt;&lt;/td&gt;
 &lt;td&gt;Future standard, partial support&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 id="crelaxedrelaxed-canonicalization"&gt;&lt;code&gt;c=relaxed/relaxed&lt;/code&gt;: Canonicalization&lt;/h3&gt;
&lt;p&gt;Defines how content is normalized &lt;strong&gt;before&lt;/strong&gt; computing the signature. The format is &lt;code&gt;headers/body&lt;/code&gt;:&lt;/p&gt;</description></item><item><title>DKIM RSA Key Size: 1024 vs 2048 Bits and the Future with Ed25519</title><link>https://senderaudit.com/blog/en/dkim-rsa-key-size/</link><pubDate>Sat, 14 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/dkim-rsa-key-size/</guid><description>&lt;p&gt;Your DKIM setup works, signatures pass. But have you checked the &lt;strong&gt;size of your RSA key&lt;/strong&gt;? A key that&amp;rsquo;s too short is a ticking time bomb: it could be cracked, allowing an attacker to sign emails on your behalf.&lt;/p&gt;
&lt;h2 id="the-history-of-dkim-keys-from-512-to-2048-bits"&gt;The History of DKIM Keys: From 512 to 2048 Bits&lt;/h2&gt;
&lt;h3 id="2012-the-end-of-512-bit-keys"&gt;2012: The End of 512-Bit Keys&lt;/h3&gt;
&lt;p&gt;In 2012, researchers demonstrated that a 512-bit RSA key could be cracked in &lt;strong&gt;under 72 hours&lt;/strong&gt; using cheap cloud computing power. The result: anyone could impersonate a domain using a 512-bit key and send perfectly DKIM-signed emails.&lt;/p&gt;</description></item><item><title>Why Do You See Two DKIM Signatures on a Single Email?</title><link>https://senderaudit.com/blog/en/double-dkim-signature/</link><pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/double-dkim-signature/</guid><description>&lt;p&gt;You inspect the headers of an email sent through your ESP (Brevo, Mailchimp, SendGrid…) and notice &lt;strong&gt;two distinct DKIM signatures&lt;/strong&gt;: one with your domain, one with the ESP&amp;rsquo;s domain. Is this normal? Absolutely, and it&amp;rsquo;s actually desirable.&lt;/p&gt;
&lt;h2 id="what-it-looks-like-in-the-headers"&gt;What It Looks Like in the Headers&lt;/h2&gt;
&lt;p&gt;Here&amp;rsquo;s a typical &lt;code&gt;Authentication-Results&lt;/code&gt; example:&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;Authentication-Results: mx.google.com;
 dkim=pass header.i=@yourdomain.com header.s=mail header.b=xjAWgYt1;
 dkim=pass header.i=@esp-domain.com header.s=mail header.b=zNRqfud1;
 spf=pass ...
 dmarc=pass (p=REJECT) header.from=yourdomain.com
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;And two &lt;code&gt;DKIM-Signature:&lt;/code&gt; blocks in the message: one with &lt;code&gt;d=yourdomain.com&lt;/code&gt;, the other with &lt;code&gt;d=esp-domain.com&lt;/code&gt;.&lt;/p&gt;</description></item><item><title>BIMI: Display Your Logo in Email Inboxes</title><link>https://senderaudit.com/blog/en/configure-bimi/</link><pubDate>Fri, 27 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-bimi/</guid><description>&lt;p&gt;Have you noticed some senders display their logo next to emails in Gmail or Apple Mail? That&amp;rsquo;s &lt;strong&gt;BIMI&lt;/strong&gt; (Brand Indicators for Message Identification). Beyond branding, BIMI is a powerful trust signal, and it relies on flawless email authentication.&lt;/p&gt;
&lt;h2 id="what-is-bimi"&gt;What Is BIMI?&lt;/h2&gt;
&lt;p&gt;BIMI is an email standard that displays your brand logo directly in the recipient&amp;rsquo;s email client. But it&amp;rsquo;s not just cosmetic:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Trust&lt;/strong&gt;: a verified logo increases recipient confidence&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Open rates&lt;/strong&gt;: studies show a 10-30% increase in opens&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Anti-spoofing&lt;/strong&gt;: BIMI requires DMARC at &lt;code&gt;quarantine&lt;/code&gt; or &lt;code&gt;reject&lt;/code&gt;, which blocks spoofing&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Brand visibility&lt;/strong&gt;: your logo appears before the message is even opened&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id="who-supports-bimi"&gt;Who Supports BIMI?&lt;/h3&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;Client / ISP&lt;/th&gt;
 &lt;th&gt;BIMI Support&lt;/th&gt;
 &lt;th&gt;VMC Required?&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;Gmail&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Apple Mail (iOS 16+, macOS Ventura+)&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Yahoo / AOL&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;La Poste&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Outlook&lt;/td&gt;
 &lt;td&gt;🔄 In progress&lt;/td&gt;
 &lt;td&gt;,&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Fastmail&lt;/td&gt;
 &lt;td&gt;✅ Yes&lt;/td&gt;
 &lt;td&gt;❌ No&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;blockquote&gt;
&lt;p&gt;Gmail is the only one requiring a VMC (Verified Mark Certificate). Others display the logo based solely on the DNS record.&lt;/p&gt;</description></item><item><title>How to Configure DMARC to Protect Your Domain</title><link>https://senderaudit.com/blog/en/configure-dmarc/</link><pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dmarc/</guid><description>&lt;p&gt;DMARC (Domain-based Message Authentication, Reporting and Conformance) is an email authentication protocol that protects your domain against spoofing and phishing. In this guide, we&amp;rsquo;ll walk through how to set it up properly.&lt;/p&gt;
&lt;h2 id="why-dmarc-is-essential"&gt;Why DMARC Is Essential&lt;/h2&gt;
&lt;p&gt;Without DMARC, anyone can send emails pretending to be your domain. The consequences are serious:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Phishing&lt;/strong&gt;: malicious actors can impersonate your brand&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Damaged reputation&lt;/strong&gt;: ISPs may penalize your domain&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lost trust&lt;/strong&gt;: your recipients can no longer tell which emails are legitimate&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote&gt;
&lt;p&gt;According to the FBI, business email compromise (BEC) scams, many of which exploit missing DMARC, caused over $2.7 billion in losses in 2022 alone.&lt;/p&gt;</description></item><item><title>Email Blacklists: Understand, Check and Get Delisted</title><link>https://senderaudit.com/blog/en/understanding-blacklists/</link><pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/understanding-blacklists/</guid><description>&lt;p&gt;Your delivery rate drops suddenly. Your emails go to spam, or worse, they&amp;rsquo;re rejected with &lt;code&gt;550 5.7.1 Service unavailable; client host blocked&lt;/code&gt;. There&amp;rsquo;s a good chance your IP or domain is on a &lt;strong&gt;blacklist&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="what-is-an-email-blacklist"&gt;What Is an Email Blacklist?&lt;/h2&gt;
&lt;p&gt;A blacklist (or RBL, Realtime Blackhole List, or DNSBL, DNS-based Blackhole List) is a database that catalogues IP addresses and domains identified as spam sources or abusive senders.&lt;/p&gt;
&lt;p&gt;Receiving servers (Gmail, Outlook, ISPs, corporate servers…) query these lists in real time to decide whether to accept, filter, or reject an email.&lt;/p&gt;</description></item><item><title>Email Deliverability: The Ultimate Guide to Reaching the Inbox</title><link>https://senderaudit.com/blog/en/email-deliverability/</link><pubDate>Tue, 03 Feb 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/email-deliverability/</guid><description>&lt;p&gt;You send emails, but do they actually reach the inbox? &lt;strong&gt;Deliverability&lt;/strong&gt; is the rate at which your emails land in recipients&amp;rsquo; inboxes, as opposed to the spam folder or outright rejection. It&amp;rsquo;s a critical issue for any business that communicates via email.&lt;/p&gt;
&lt;h2 id="why-your-emails-arent-arriving"&gt;Why Your Emails Aren&amp;rsquo;t Arriving&lt;/h2&gt;
&lt;p&gt;ISPs (Gmail, Outlook, Yahoo, etc.) use hundreds of signals to decide the fate of each email. Here are the main ones:&lt;/p&gt;
&lt;h3 id="1-dns-authentication"&gt;1. DNS Authentication&lt;/h3&gt;
&lt;p&gt;This is the absolute prerequisite. Without it, you&amp;rsquo;re a stranger to ISPs.&lt;/p&gt;</description></item><item><title>DKIM: Sign Your Emails to Prove Their Authenticity</title><link>https://senderaudit.com/blog/en/configure-dkim/</link><pubDate>Sat, 24 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-dkim/</guid><description>&lt;p&gt;DKIM (DomainKeys Identified Mail) adds a cryptographic signature to every outgoing email. The receiving server can verify that the message wasn&amp;rsquo;t altered in transit and that it came from an authorized sender. It&amp;rsquo;s the second pillar of email authentication, after &lt;a href="https://senderaudit.com/blog/en/configure-spf/"&gt;SPF&lt;/a&gt;.&lt;/p&gt;
&lt;h2 id="how-dkim-works-the-simple-version"&gt;How DKIM Works, The Simple Version&lt;/h2&gt;
&lt;p&gt;Think of it like sending a letter with a wax seal. The recipient can verify the seal isn&amp;rsquo;t broken (the message is intact) and that the seal matches your crest (you&amp;rsquo;re the legitimate sender).&lt;/p&gt;</description></item><item><title>SPF: The Complete Guide to Authorizing Your Sending Servers</title><link>https://senderaudit.com/blog/en/configure-spf/</link><pubDate>Sat, 17 Jan 2026 00:00:00 +0000</pubDate><guid>https://senderaudit.com/blog/en/configure-spf/</guid><description>&lt;p&gt;SPF (Sender Policy Framework) is the first line of defense in email authentication. It lets you declare in your DNS which servers are allowed to send email for your domain. Simple on the surface, it hides subtleties that trip up even experienced admins.&lt;/p&gt;
&lt;h2 id="what-does-spf-actually-do"&gt;What Does SPF Actually Do?&lt;/h2&gt;
&lt;p&gt;When a receiving server gets an email from &lt;code&gt;contact@yourdomain.com&lt;/code&gt;, it asks one question: &lt;em&gt;&amp;ldquo;Is this server allowed to send for this domain?&amp;rdquo;&lt;/em&gt;&lt;/p&gt;</description></item></channel></rss>