Here we report on trends in email with a focus on spam, as well as technological trends in anti-spam measures. Regarding trends in technology, we continue to discuss sender authentication technology and report on the status of its adoption.
In this volume of the report, we examine past failures and give an overview of the factors behind vulnerabilities in cryptographic implementations that result from reduced space for keys and various parameters similar to ROCA. I will also touch upon the future impact of the results from a series of research projects on attacks such as ROCA.
In this report, we examine and explain several countermeasures against the improper use of email that have been effective, based on experience implementing and operating them on a variety of email systems.