#1872: DMARC: The Bouncer for Your Email

SMTP is broken. DMARC is the fix. Learn why your emails might vanish after April 2026 and how to stop domain spoofing.

0:000:00
Episode Details
Episode ID
MWP-2028
Published
Duration
27:13
Audio
Direct link
Pipeline
V5
TTS Engine
chatterbox-regular
Script Writing Agent
Gemini 3 Flash

AI-Generated Content: This podcast is created using AI personas. Please verify any important information independently.

The Global Email System Is Built on a Pinky Promise

It is Tuesday morning, and an employee receives an urgent email from the CEO requesting a wire transfer. The sender address is perfect: ceo@yourcompany.com. The tone is right, the signature is there. But the reality is that an attacker in another country just typed that address into a script and hit send. No passwords were stolen, no servers breached. They just lied, and the global email system, by default, believed them.

This is the fundamental flaw of the Simple Mail Transfer Protocol (SMTP). Designed in the early 1980s, SMTP was built for an era of academic trust where nobody thought someone would pretend to be someone else. It lacks a built-in authentication mechanism; when a server receives a message, it simply looks at the commands and delivers them. It is the digital equivalent of writing a return address on an envelope—the post office does not verify it before placing it in the mailbox.

The Cost of Trust
This design oversight fuels business email compromise, costing businesses billions annually. The most dangerous type of spoofing is "exact-domain spoofing," where an attacker uses a fake domain that looks identical to the real one, rather than a typo-ridden variation. To fix this, the industry relies on a three-layered security check: SPF, DKIM, and DMARC.

SPF: The Guest List
Sender Policy Framework (SPF) is a text record in your Domain Name System (DNS) that lists the IP addresses authorized to send mail for your domain. If a message comes from an IP not on the list, the receiving server marks it as a fail. However, SPF has a massive limitation: it only checks the "envelope from" address (the return address used for routing) and not the "header from" address that humans actually see in their email client. An attacker can set up a fake domain, pass SPF for that domain, and put your email address in the header, fooling the recipient.

DKIM: The Wax Seal
DomainKeys Identified Mail (DKIM) adds cryptography to the mix. When a server sends an email, it creates a cryptographic hash of the message content and signs it with a private key. The recipient’s server retrieves the public key from the DNS to verify the signature. This ensures two things: the email definitely came from the claimed server, and the content hasn’t been tampered with in transit. If a hacker alters a wire transfer amount mid-route, the DKIM signature breaks, alerting the recipient.

DMARC: The Bouncer
Neither SPF nor DKIM is enough on its own. If an email arrives without a signature or from an unauthorized IP, the receiving server often delivers it anyway to avoid blocking legitimate mail. This is where DMARC (Domain-based Message Authentication, Reporting, and Conformance) acts as the glue.

DMARC instructs receiving servers to check both SPF and DKIM and, crucially, enforces "alignment." Alignment ensures that the domain validated by SPF or DKIM matches the domain visible in the header from address. If an attacker passes SPF for attacker.com but uses yourcompany.com in the header, DMARC flags the mismatch and blocks the email.

The Reporting Revolution
DMARC’s most powerful feature is the "R"—Reporting. By publishing a DMARC record, you can specify an email address to receive daily XML reports from major providers like Google and Microsoft. These reports list every IP address that attempted to send mail using your domain and whether they passed or failed authentication.

While sifting through raw XML files is impractical, tools like DMARC Analyzer or MXToolbox parse this data into visual maps. This visibility often reveals surprising insights, such as a server in Eastern Europe spoofing the CEO’s name or a marketing team using an unauthorized newsletter tool that fails authentication.

The 2026 Deadline
In 2024, Google and Yahoo began enforcing DMARC requirements for senders of over 5,000 daily emails, throttling delivery for non-compliant domains. By April 2026, these rules have tightened further: even small senders with spam complaint rates above 0.3% face the "void," where emails simply disappear from inboxes.

Implementation requires caution. Setting DMARC to "reject" without understanding your legitimate traffic can block your own invoices, marketing campaigns, and password resets. The process typically starts with a "monitor" mode (p=none) to gather data, followed by gradually moving to "quarantine" and finally "reject" as you validate all authorized senders.

Open Questions
While DMARC is the current standard, the industry continues to evolve. Emerging protocols like BIMI (Brand Indicators for Message Identification) aim to display verified logos next to emails, adding a visual trust layer. However, the core challenge remains: balancing security with usability in a system designed decades ago for a trust-based world.

For now, DMARC is the essential bouncer at the door, transforming SMTP from a pinky promise into a verifiable identity check.

Downloads

Episode Audio

Download the full episode as an MP3 file

Download MP3
Transcript (TXT)

Plain text transcript file

Transcript (PDF)

Formatted PDF with styling

#1872: DMARC: The Bouncer for Your Email

Corn
Imagine you are sitting at your desk, it is a Tuesday morning, and you get an email from your CEO. The subject line is urgent, something like internal wire transfer authorization needed immediately. You look at the sender address, and it looks exactly right. It says ceo at yourcompany dot com. You click it, the tone sounds like him, the signature is there, everything feels legitimate. But the reality is that an attacker in another country just typed that address into a script and hit send. No password was stolen, no server was breached. They just lied, and the global email system, by default, believed them.
Herman
That is the fundamental flaw of the Simple Mail Transfer Protocol, or SMTP. It was designed in an era of academic trust where nobody thought someone would just pretend to be someone else. It is basically the digital equivalent of writing a return address on the back of an envelope. You can write whatever you want there. The post office doesn't verify it before they put it in the recipient's mailbox.
Corn
It’s wild to think that the backbone of global business communication is essentially built on a pinky promise. If I send a letter claiming to be the IRS, the paper doesn't catch fire. SMTP works the same way. It just carries the message from point A to point B without glancing at the ID of the sender.
Herman
And that little design oversight is currently costing businesses billions of dollars every year in business email compromise. Today's prompt from Daniel is about how we actually fix this using DMARC. He wants us to dig into what it is, how it stops impersonation, and why, as of April two thousand twenty-six, it is no longer just a nice to have security feature, but a requirement for even getting your emails delivered.
Corn
It is a great prompt from Daniel because DMARC is one of those things that sounds like alphabet soup until you realize it is the only thing standing between your brand's reputation and a phisher's script. By the way, today's episode is powered by Google Gemini three Flash, which is helping us break down these protocols.
Herman
I love that we are using an AI to talk about a protocol that is increasingly being used to fight AI-generated phishing. It is a very two thousand twenty-six circle of life situation. But Herman, before we get into the weeds, let's establish the acronyms. We have SPF, DKIM, and DMARC. Every time I see these in a DNS setting, I feel like I am looking at a flight manifest. What is the actual hierarchy here?
Herman
Think of it as a three-layered security check. SPF is your guest list. DKIM is your wax seal or digital signature. And DMARC is the set of instructions you give the bouncer at the door for what to do if someone isn't on the list or the seal is broken. Without DMARC, you have a guest list and a seal, but the bouncer has no idea if he should kick people out or just let them in anyway.
Corn
So if I have SPF and DKIM set up, but no DMARC, I am basically telling the world, hey, here is who is allowed to send mail for me, and here is how to verify it is me, but if you see someone pretending to be me, do whatever you want. I don't care.
Herman
That is exactly the situation for about seventy percent of domains out there, even now. Most people stop at SPF because it is the easiest to set up. But SPF has massive limitations. It only checks the return path address—the "envelope from"—not the "header from" address that the human actually sees in their Outlook or Gmail.
Corn
Wait, can you break that down? Why are there two different "from" addresses? That seems like it was designed specifically to help hackers.
Herman
It’s a relic of how mail is routed. Think of the "envelope from" as the return address the post office uses if the mail can't be delivered. The "header from" is the name written at the top of the actual stationery inside. SPF only checks the envelope. So, if I am an attacker, I can set up a fake domain like attacker dot com, pass SPF for that domain because I own it, but then put your email address in the "header from" section. Most email clients will show the header, and the user gets fooled.
Corn
That is the exact-domain spoofing Daniel mentioned in his notes. It is the most dangerous kind because it looks perfect to the naked eye. There is no typo, no yourcompany-support dot net. It is just your domain. So, how did we get here? Why is SMTP so broken that we need three different patches just to make it functional?
Herman
It goes back to the early eighties. The pioneers of the internet were more concerned with making sure the mail actually arrived than making sure it wasn't a scam. SMTP doesn't have a built-in authentication mechanism. When a mail server receives a message, it just looks at the commands. If it says mail from corn at sloth dot com, the server says, okay, hi Corn. It doesn't ask for an ID.
Corn
It is the ultimate polite system in an increasingly impolite world. I remember the twenty twenty Twitter Bitcoin scam. That was a high-profile version of this where spoofed messages caused massive financial loss. People often forget that even if you have a blue checkmark or a verified status on a platform, if the underlying email delivery can be spoofed, an attacker can reset passwords or trick employees into giving up credentials.
Herman
Right, and that brings us to the first pillar of the fix: SPF, or Sender Policy Framework. This is a simple text record in your Domain Name System, your DNS. It lists the IP addresses or services that are authorized to send mail for your domain. So if you use Google Workspace and Mailchimp, your SPF record says, only servers owned by Google and Mailchimp are allowed to send mail claiming to be from mydomain dot com.
Corn
But what happens if my company is huge? Like, if we have five different marketing agencies all sending mail for us from different platforms? Does that SPF record just grow forever?
Herman
It can, but that’s actually a trap we should talk about later—the ten-lookup limit. But for now, just think of it as a whitelist. If a mail comes from an IP not on that list, the receiving server marks it as "soft fail" or "fail." But again, without DMARC, most servers just deliver it anyway because they don't want to be responsible for blocking a legitimate message.
Corn
Okay, so SPF is the list. But you said earlier that SPF only checks the return path. If I am a hacker and I use my own server that passes its own SPF check, but I lie in the from header, SPF doesn't catch me. So then we bring in the second pillar, DKIM. Tell me about the digital signature part.
Herman
DKIM stands for DomainKeys Identified Mail. This is where we get into cryptography. When your server sends an email, it takes a look at the content of the message—the headers, the body—and it creates a cryptographic hash. It then signs that hash with a private key that only you own. The public key is published in your DNS records.
Corn
So when the recipient's server gets the email, it sees the signature, grabs the public key from my DNS, and does the math. If the math checks out, it knows two things: the email definitely came from my server, and it hasn't been tampered with in transit.
Herman
Precisely. If a hacker tries to change the wire transfer amount from one thousand to ten thousand dollars while the email is moving through the internet, the DKIM signature will break. The hash won't match anymore. It’s like a tamper-evident seal on a pill bottle. If the seal is broken, you know someone messed with the contents.
Corn
But here is the catch, Herman. What happens if an email arrives with no DKIM signature at all? Or if the signature is there but it’s for a completely different domain?
Herman
That’s the "broken seal" problem. Without a policy to guide it, the receiving server just shrugs and delivers it anyway. It assumes it is just an old-school email from a server that doesn't support DKIM. This is why these two aren't enough. You can have the best locks in the world, but if the door is left wide open for anyone who doesn't have a key, the locks are just decoration. This is where DMARC comes in to save the day.
Corn
DMARC is Domain-based Message Authentication, Reporting, and Conformance. That is a mouthful. But essentially, it is the glue. It says, hey, receiving server, I want you to look at both SPF and DKIM. And more importantly, I want you to check for alignment.
Herman
Alignment is the secret sauce. This is what stops that from header spoofing we talked about. DMARC requires that the domain validated by SPF or DKIM actually matches the domain the user sees in the from address. If I send an email from my attacker server and it passes SPF for attacker dot com, but the from address says corn at sloth dot com, DMARC sees that sloth dot com and attacker dot com do not align. It flags it as a fail.
Corn
This feels like such an obvious requirement in hindsight. Why did it take us so long to get to a point where this is mandatory? Daniel mentioned that in twenty twenty-four, Google and Yahoo finally put their foot down.
Herman
It was a massive coordination problem. If Google had started blocking all unauthenticated mail ten years ago, people would have just complained that their emails weren't getting through and switched to another provider. But by twenty twenty-four, the volume of phishing had reached a breaking point. Google and Yahoo, who handle a massive percentage of global personal email, basically said, if you send more than five thousand emails a day to our users, you must have a DMARC record.
Corn
And what does that actually look like for the sender? If I’m a big retailer sending out a Black Friday blast and I haven't set this up, am I just hitting a brick wall?
Herman
You’re hitting a very expensive brick wall. They started by "throttling"—which means they just slow down your delivery until it takes days for your mail to arrive. Then they move to the "void." If you don't have a DMARC record, your mail simply doesn't exist to them. And here we are in twenty twenty-six, and those rules have only tightened. I've heard that now, even if you are a small sender, if your spam complaint rate ticks above zero point three percent, and you don't have DMARC, you are basically invisible to the major inboxes. It is the deliverability death penalty.
Corn
It really is. And the beauty of DMARC isn't just the blocking; it is the R in the acronym, Reporting. This is the part that most people overlook but it is actually the most powerful tool for an IT department. When you set up a DMARC record, you can include an email address where you want to receive reports. Every day, major providers like Google, Microsoft, and Comcast will send you an XML file listing every single IP address that tried to send mail using your domain and whether they passed or failed authentication.
Corn
That sounds like a lot of data to sift through. I can imagine a sloth like me getting overwhelmed by a bunch of XML files every morning. Do people really open these in Notepad and read the code?
Herman
Oh, you definitely don't read them yourself. That would be a nightmare. You use a tool like DMARC Analyzer or MXToolbox. They take those files and turn them into beautiful maps and charts. Suddenly, you realize, oh wait, why is there a server in Eastern Europe sending ten thousand emails a day using our CEO's name? Or, more commonly, you realize, oh, our marketing team in the London office started using a new newsletter tool and they forgot to tell IT, so all their legitimate emails are failing authentication.
Corn
That is a huge point. Implementation isn't just about flipping a switch and feeling safe. If you do it wrong, you are basically DOSing your own company. You could block your own invoices, your own marketing, your own password resets. It’s like hiring a bouncer who is so strict he won't even let the owner of the club inside.
Herman
That is why there is a very specific, phased approach to implementing DMARC. You don't start by blocking everything. You start with what we call p equals none.
Corn
Monitoring mode. The bouncer is just standing there with a clipboard taking notes, but letting everyone in regardless.
Herman
Right. You stay in p equals none for a few weeks or even months. You look at those reports. You identify all the legitimate services that are sending mail on your behalf. You make sure they are added to your SPF record and that their DKIM keys are set up correctly. Once your reports show that ninety-nine percent of your legitimate mail is passing and aligning, then you move to the next level: p equals quarantine.
Corn
And quarantine is the spam folder. The bouncer says, I don't recognize you, you're not on the list, so I'm going to let you in but I'm going to tell everyone to keep an eye on you. It’s a "soft" rejection.
Herman
It's a safety net. If you missed a small legacy server somewhere—maybe an old printer that sends scan-to-email alerts—the mail still gets through, but it's hidden. If that goes well and you don't see any legitimate mail getting lost, you move to the final boss level: p equals reject. This is the gold standard. This is when the bouncer just slams the door. The email is never delivered. The attacker gets nothing, and your user never even knows someone tried to spoof you.
Corn
That reject policy is what you need if you want the cool perks, too, right? Daniel mentioned BIMI. Brand Indicators for Message Identification. I've started seeing logos next to emails in my inbox lately. Is that tied to DMARC?
Herman
It is directly tied to it. To get your verified brand logo to show up in the avatar slot in Gmail or Apple Mail, you are required to have a DMARC policy of p equals reject. The email providers are basically saying, we will give you this premium branding and trust signal, but only if you prove to us that you have secured your domain so thoroughly that no one can impersonate you. It is a brilliant incentive structure. It turns a boring security task into a marketing win.
Corn
I love that. It's like getting a VIP pass because you proved your house has a security system. But let's talk about the common pitfalls. I know you've seen some horror stories in the research papers you read, Herman. What goes wrong when people try to do this?
Herman
The biggest one is the SPF ten-lookup limit. People don't realize that when a receiving server checks your SPF record, it is only allowed to perform ten DNS lookups to avoid being used in Denial of Service attacks. If you use a lot of third-party tools, like Salesforce, Zendesk, Mailchimp, and HubSpot, each of those has their own lookups inside their SPF records. You hit that ten-lookup limit very quickly.
Corn
And if you hit eleven? Does it just ignore the eleventh one, or does the whole thing blow up?
Herman
The whole SPF check fails. Even if the service is authorized, the server just gives up. This is a huge cause of legitimate mail failing DMARC. There are modern solutions now, like SPF flattening, where a service dynamically keeps your record under the limit by resolving everything into IP addresses, but it's a classic trap for the unwary.
Corn
Another thing I've seen is issues with third-party senders not supporting DKIM properly. If I'm using a small, niche SaaS tool for my industry, they might send mail from my domain but not give me a way to add a DKIM key. What do you do then? Do you just live with the vulnerability?
Herman
That's where you have to lean on SPF for alignment, but it's risky. DMARC passes if either SPF or DKIM passes and aligns. But as we discussed, SPF is fragile. If that email gets forwarded by the recipient to someone else—say, a manager forwarding an invoice to the accounting department—SPF almost always breaks because the forwarding server's IP isn't in your list. DKIM, however, survives forwarding because the signature is attached to the message itself. This is why you really want both. If a vendor doesn't support DKIM in twenty twenty-six, honestly, you should probably find a new vendor. It's a sign of a very dated architecture.
Corn
It’s basically like a car manufacturer not including seatbelts at this point. It’s a basic safety standard. I want to go back to the human element of this. We talk about DMARC as this technical shield, but phishing is fundamentally a psychological attack. Does DMARC stop the guy who buys a domain that is just one letter off from mine? Like sloth-support dot com instead of sloth dot com?
Herman
No, and that is a crucial distinction. DMARC only protects the domain you own. It stops exact-domain spoofing. If an attacker buys a look-alike domain, they own that domain, they can set up their own SPF, DKIM, and DMARC for it, and it will pass all the technical checks perfectly. The bouncer sees their ID, sees it's a real ID, and lets them in—even if the name on the ID is "Sl0th" instead of "Sloth."
Corn
So DMARC isn't a silver bullet for all phishing. It's just the shield for your specific castle. It doesn't stop someone from building a fake castle next door that looks just like yours.
Herman
To stop look-alike domains, you need other tools, like AI-based content analysis or brand monitoring services that alert you when someone registers a domain similar to yours. But exact-domain spoofing is much more dangerous because it bypasses the most basic human intuition. Most people have been trained to check for weird characters or typos in a sender's address. But if the address is literally ceo at yourcompany dot com, you've removed the primary red flag. That's why DMARC is so foundational. It handles the stuff that humans can't be expected to catch.
Corn
It’s interesting to think about how this affects the broader ecosystem. If everyone implemented DMARC at p equals reject, would phishing just disappear? Or would it just evolve into something even more complex?
Herman
It already is evolving. We're seeing a massive shift toward compromised accounts. Instead of spoofing your domain, an attacker just steals the actual credentials for one of your employees—maybe through a session cookie theft—and sends the email from their real account. DMARC can't do anything about that because it is a legitimate login. This is why we always say security is about layers. DMARC stops the cheap, high-volume spoofing, which forces attackers to work harder. It makes them have to actually breach an account or build a convincing fake domain, both of which are harder and more expensive than just lying in an SMTP header.
Corn
It's the classic "move the goalposts" strategy. You don't have to be unhackable; you just have to be harder to hack than the guy next to you. If the attacker has to spend three days trying to breach an account versus three seconds to spoof a header, they’re going to move on to an easier target.
Herman
Precisely. And for bulk senders, it's about reputation. If you are a company sending out millions of emails and you don't have DMARC, your domain reputation with Google and Microsoft will slowly tank. Because attackers will use your domain to send spam, users will report that spam, and the algorithms will associate your domain with garbage. DMARC allows you to protect your reputation by ensuring that the only mail being counted against you is the mail you actually sent.
Corn
So, for the listeners who are sitting there thinking, okay, I need to check my DMARC status. Where do they start? If I'm a small business owner or an IT manager who hasn't looked at this in a while, what is the first move? Is there a "check my grade" button somewhere?
Herman
The very first move is to go to a tool like MXToolbox or dmarcian and just type in your domain. It will tell you immediately if you have a record and what the policy is. If it says "no record found," you need to act. Step one is simply publishing a record that says p equals none. It's safe, it won't break anything, and it starts the flow of data.
Corn
And then you start the inventory. You have to find every single shadow IT project that is sending mail. I bet that’s where the real work is. Finding that one old server in a closet that’s been sending automated reports for ten years. Or the HR department’s third-party survey tool.
Herman
Every single time. You’ll find things you didn't even know existed. You might find that your HR system sends out payroll notifications from a legacy domain. You might find that your building's security system sends alerts using your corporate domain. DMARC implementation is secretly a great way to do a full audit of your company's digital footprint. It forces you to know who is talking on your behalf.
Corn
It’s like a digital census. I also think it’s worth mentioning that this isn't just about email anymore. We’re seeing similar concepts being applied to other forms of communication. But email remains the king of the business world, and as long as it is, DMARC is the crown jewel of its security.
Herman
It really is. And as we move deeper into twenty twenty-six, we're seeing governments get involved. The European Union's NIS2 directive, for example, is pushing for much stricter authentication standards for essential entities. DMARC is often cited as a baseline requirement. If you’re doing business in a regulated industry, you might soon find that you’re legally required to be at p equals reject.
Corn
It’s the move from optional best practice to mandatory compliance. We’ve seen this story before with things like HTTPS for websites. Ten years ago, a lot of sites didn't bother with SSL. Now, if you don't have it, your browser screams that the site is dangerous and you lose all your traffic. Email is going through that exact same transition right now.
Herman
That’s a perfect comparison. The "green padlock" of the email world is BIMI and the absence of a spam warning. If you want your messages to be treated as first-class citizens in the inbox, you have to pay the entry fee of proper authentication. If you don't, you're relegated to the "dangerous" category.
Corn
I think the most interesting takeaway for me is that DMARC is actually a collaborative protocol. It only works because the senders and the receivers agreed on a way to talk to each other. It’s a rare example of the whole internet coming together to fix a fundamental flaw in an old system. It took a long time, but the consensus is finally here.
Herman
It is. It took twenty years of arguing and different competing standards, but we finally landed on something that works. It’s not perfect, and it doesn't stop every type of fraud, but it effectively eliminates one of the oldest and easiest tricks in the hacker’s book. That’s a massive win for the good guys.
Corn
So, the practical roadmap is: monitor, analyze, authenticate, and then enforce. Don't be the person who flips the reject switch on day one unless you really like getting angry phone calls from your boss about missing emails. You have to earn that "reject" status through data.
Herman
Please, for the love of all things holy, do not start with reject. I have seen companies accidentally block their own outbound sales for an entire week because they forgot that their CRM sends emails from a different set of IPs. Start with none. Be a sloth about it, Corn. Take it slow. Watch the data for at least thirty days before you even think about moving to quarantine.
Corn
Hey, I’m always in monitoring mode. That’s my natural state of being. But seriously, the reporting part is fascinating. If you’re a nerd like us, seeing a map of all the servers around the world that are trying to use your domain is eye-opening. It makes the threat landscape feel very real and very immediate. You see these pings from random data centers in places you've never even visited.
Herman
It really does. You realize you’re not just a passive target; you’re part of a global battle for identity. And DMARC gives you the weapons to fight back. It’s one of the few areas of security where you can actually get to a state of near-perfect protection against a specific attack vector. You can't say that about many things in cybersecurity.
Corn
Well, I feel a lot better about my inbox already, or at least I will once I check the DMARC record for sloth dot com. We should probably see if anyone is trying to impersonate us. Though, why anyone would want to be a sloth or a donkey is beyond me.
Herman
Maybe they want our collection of technical white papers. I’ve got some rare ones from the early nineties about the original SMTP proposals. They're worth a lot in certain very specific, very boring circles.
Corn
I’ll stick to the summaries, thanks. This has been a great deep dive. I think it’s one of those topics that feels dry until you realize it’s the difference between a secure business and a wire transfer to a stranger. It's the plumbing of the internet, and nobody cares about the pipes until they burst.
Herman
Exactly what Daniel was going for, I suspect. It’s the plumbing of the internet. You don't think about it until it leaks, but once it does, it’s all you can think about. It's about building a foundation of trust in a system that was originally built on nothing but handshakes.
Corn
Well, no leaks here today. We’ve covered the why, the how, and the pitfalls. I think we’re ready to wrap this one up.
Herman
Agreed. It’s a great place to leave it. If you’re listening to this and you haven't checked your domain today, let this be your sign. Go do an MX lookup. It takes thirty seconds and could save you a lot of heartache. It's the easiest security win you'll get all week.
Corn
Thanks as always to our producer Hilbert Flumingtop for keeping us on track and making sure we don't get too lost in the DNS records. And a big thanks to Modal for providing the GPU credits that power this show. If you found this useful, or if you’ve had your own DMARC disaster story, we’d love to hear about it. Did you accidentally block your own wedding invitations? Let us know.
Herman
This has been My Weird Prompts. You can find us at myweirdprompts dot com for the full archive and all the ways to subscribe. We've got show notes there that break down these acronyms in even more detail for those who want to see the syntax.
Corn
And if you're enjoying the show, a quick review on your podcast app really does help us reach more people who might be currently getting spoofed. It helps the algorithm realize we're the "aligned" version of a tech podcast.
Herman
See you next time.
Corn
Later.

This episode was generated with AI assistance. Hosts Herman and Corn are AI personalities.