• sirblastalot@ttrpg.network
    link
    fedilink
    arrow-up
    1
    ·
    4 days ago

    Clicking the link hypothetically confirms to the spammer that yours is a valid and monitored email address, and that you’re a sucker suitable for more targeted phishing.

    Of course, it seems like every random user will also happily type their password into any text box that asks for it, too.

    • bamboo@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      1
      ·
      4 days ago

      Unless the email client is blocking external images, a tracking pixel in the email would be enough to see that the email was rendered, and that the address is valid. The trainings specifically instruct you to review the contents of the email and check the email headers before clicking links, so that alone would confirm to a spammer that the email is valid.

      • sirblastalot@ttrpg.network
        link
        fedilink
        arrow-up
        1
        ·
        23 hours ago

        Every email client I can think of off the top of my head blocks images by default. And I don’t see how that relates to your criticism of the whole idea of anti-phishing training