..........................So illuminate me, please........................ .........................
If it wouldn't teach some of these tards how to spoof, I'd ask you to explain it, but I'll let the dumb ones fend for themselves.
They seem to be doing just fine with the shovels they've got........................... .....................
Originally Posted by FoxyNC
I'll pass on bringing any light to this and you answered as to why. ha, ha!
..........................hypo thetically.... (since this is actually very close to & on topic here):
if janedoe123@whateveremail . com emails me (from an allegedly spoofed email)
and I send her a reply... by composing a new mail...
typing in her email address manually ....
ya know.. just to make sure that nothing "funny with coding is going on" and make sure to check a quick glimpse through html formatting.... ya know... just to check...
And let's say this same BSC janedoe123 @ whatevermail . com
then sends me back a response regarding my first response....
(responding right where she left off from the first alleged spoof mail, heh.)
Is janedoe123 @ whateveremail . com 's 2nd email then spoofed? Or do I have a complete circuit? I think the response would pretty much solidify proof against /alleviate any spoofing concerns without the use of any techie stuff. More like deductive reasoning, Watson....
Y'all follow what I am saying?....
At any rate, I find it disconcerting the back & forth (drama) but what is done in the dark, will come to the light.
Thankyou for at least trying to enlighten us.
I know I appreciate it............................ .............................. ...
Originally Posted by FoxyNC
as for this part. I followed it and that is indeed proof.
that wasn't my point. I didn't doubt either of you. didn't you see my followup post? ha!
going back to my point though. you typing in the address manually negates that return path you circled. you understand this as you described. now think about this from a trouble shooting aspect. had that address been manipulated you typing in the address manually falls for the manipulation as you are using the address whoever did the manipulation wants you to. do you see my point? I am not saying that happeneed here. just another hypothetical possibility.