Today's Deep-Dive: Exim Internet Mailer
Ep. 373

Today's Deep-Dive: Exim Internet Mailer

Episode description

Sending an email feels instant and effortless - but behind that simple click is a vast layer of open-source infrastructure that quietly keeps the internet running. In this episode, we dive into Exim, one of the world’s most important mail transfer agents, and explore the invisible machinery that routes, filters, and secures email at global scale.

Exim operates behind the scenes as a message transfer agent (MTA), the software responsible for moving email from server to server across the internet. Originally developed at the University of Cambridge, it became a major alternative to Sendmail by offering greater flexibility, extensive routing options, and powerful controls for checking incoming mail. Today, it remains a foundational part of internet communication - even if most users never see its name.

We unpack the architectural realities of running software like this: a codebase written primarily in C, optimized for speed and low-level system control, but demanding constant vigilance because of the security risks that come with manual memory management. That tension becomes especially clear in the episode’s discussion of a recent remote heap corruption vulnerability, and why the Exim team takes such a hard line on obsolete versions.

But this deep dive is about more than software internals. We also explore Exim’s recent decision to leave GitHub and move to a self-hosted Forgejo instance, a major act of digital independence that reflects a broader concern in open source: foundational internet infrastructure should not depend on centralized corporate platforms. Combined with self-hosted bug tracking and traditional mailing lists, Exim’s development workflow reflects a deep commitment to open, independent systems.

At its core, this episode is about the hidden communities that maintain the internet’s essential infrastructure—and the urgent question of what happens when those communities must hand that responsibility to the next generation.

If you’ve ever wondered what really happens after you press “send,” this deep dive into Exim reveals the open-source systems - and the people - quietly making global communication possible.

Gain digital sovereignty now and save costs

Let’s have a look at your digital challenges together. What tools are you currently using? Are your processes optimal? How is the state of backups and security updates?

Digital Souvereignty is easily achived with Open Source software (which usually cost way less, too). Our division Safeserver offers hosting, operation and maintenance for countless Free and Open Source tools.

Try it now!

Download transcript (.srt)
0:00

You know, whenever you sit down on your laptop,

0:01

type out a quick message, and hit send on an email,

0:04

there is this immediate expectation of magic.

0:08

Oh, absolutely.

0:09

You click the button, there's that little swoosh sound,

0:12

and instantly, someone halfway across the world

0:15

gets a notification on their phone.

0:17

We don't even think about it.

0:18

Right, it feels completely frictionless,

0:20

like instant teleportation of your thoughts.

0:22

Exactly, but beneath that frictionless surface,

0:26

there is this massive industrial scale machinery

0:29

working frantically.

0:31

Yeah, I mean, it has to figure out

0:32

where that message actually needs to go,

0:34

how it's going to get there, and whether it's

0:36

safe to deliver at all.

0:38

And the most fascinating part of that machinery

0:41

is who actually owns it, because it isn't usually

0:43

the big tech companies whose logos are on your screen.

0:46

No, not at all.

0:47

The invisible infrastructure running our daily communications

0:50

is often built, maintained, and fiercely protected

0:53

by independent volunteer communities.

0:54

Right, and recently, some of those communities

0:57

have been making drastic moves to guarantee

0:59

they don't get swallowed up by tech monopolies.

1:02

They are actively migrating away from corporate platforms

1:05

to ensure the internet's core infrastructure remains

1:07

independent.

1:09

Which is actually the perfect entry point

1:10

to talk about the supporter of today's deep dive safe server.

1:14

Because just like we take the routing of our email

1:16

for granted, a lot of organizations

1:18

take their expensive proprietary software for granted.

1:21

Oh, definitely.

1:22

They just accept the massive licensing fees

1:24

for things like Microsoft Exchange or Google Workspace

1:27

as an unavoidable cost of doing business.

1:31

Right.

1:31

But safe server steps in and says,

1:33

you actually have much better options.

1:35

They help organizations replace those expensive proprietary

1:38

email and workspace tools with incredibly powerful open source

1:42

solutions.

1:43

And we are talking massive cost savings here.

1:45

Huge savings.

1:46

But beyond the budget, it really comes down to data sovereignty.

1:49

If your business or association deals

1:51

with legal, regulatory, or compliance requirements,

1:54

think strict email retention policies, data protection laws,

1:58

financial records, or rock solid audit trails,

2:01

you cannot afford to lose control of your information.

2:04

You need to know exactly where your data lives

2:06

and who holds the keys.

2:07

Exactly.

2:08

And safe server guides you from the very first consulting

2:11

meeting all the way through to full operation

2:14

on highly secure German servers.

2:16

So to take back control of your digital infrastructure,

2:20

head over to safeserver.de, that's www.safeserver.de.

2:25

Taking control of the underlying infrastructure

2:28

is exactly what we are dissecting today.

2:30

Yes, welcome to the deep dive.

2:32

Today we are exploring a piece of software

2:34

that practically runs the internet,

2:36

even if you've never heard its name.

2:38

It's called the Exum Internet Mailer.

2:40

It's a true hidden giant.

2:42

It really is.

2:43

And we've got a fascinating stack of sources

2:44

today pulling directly from Exum's official website

2:48

and their master source code repository.

2:50

There's a lot to unpack there.

2:51

Definitely.

2:52

Our mission for this deep dive is

2:53

to give you, especially if you're a beginner,

2:55

the network architecture a clear, easy entry

2:58

point into what this foundational piece of software

3:00

is, how it actually works under the hood,

3:02

and why it just recently made a massive rebellious shift

3:05

in how it's developed.

3:06

So to understand what Exum is, we first

3:08

have to separate the program you use to write your email

3:10

from the program that actually moves it.

3:12

Right, the front end versus the back end.

3:14

Exactly.

3:15

The software on your phone or laptop, like Apple Mail

3:19

or Outlook, that's called a Mail User Agent, or MUA.

3:23

But Exum operates a layer deeper.

3:26

The documentation defines Exum as a message transfer agent,

3:31

or an MTA.

3:33

It was originally developed at the University of Cambridge

3:35

for use on Unix systems connected to the internet.

3:38

So let me put a picture to this for you.

3:40

Think of Exum as a massive digital postal sorting

3:44

facility.

3:44

OK, I like that analogy.

3:45

Right, it doesn't write the letters for you.

3:47

It certainly doesn't read them out loud to you.

3:49

It's the invisible infrastructure.

3:51

Yeah, you drop your envelope in the blue mailbox,

3:54

and Exum is the facility that takes over.

3:56

Exactly, it looks at the zip code,

3:57

figures out if the package needs to go by truck or by plane,

4:00

checks to make sure the envelope isn't

4:02

leaking any hazardous materials, and routes it

4:04

to the exact right local post office.

4:07

That is the perfect way to visualize the logistics layer.

4:10

You know, when Exum was created, there was another famous tool

4:13

doing this job called SendMail.

4:15

Right, SendMail was the big one back in the day.

4:17

SendMail was the dominant force, yeah.

4:19

But it was notoriously difficult to configure,

4:22

so Exum was designed so it could be

4:24

installed in place of SendMail.

4:26

Ah, a drop-in replacement.

4:28

Exactly.

4:29

The documentation notes it's similar in style

4:32

to an even older mailer called Smail3,

4:34

but vastly more general.

4:36

And the reason Exum became such a cornerstone

4:38

of internet communication is its flexibility.

4:42

Because it can handle complex routing.

4:44

Yes.

4:44

It offers incredibly flexible routing capabilities

4:47

and extensive facilities for checking incoming mail.

4:49

And given the sheer volume of spam, fishing attempts,

4:54

and malicious traffic on the internet today,

4:56

those incoming checks are totally non-negotiable.

4:59

Oh, absolutely.

5:00

You essentially need a highly-trained bouncer

5:02

at the loading dock of your sorting facility.

5:04

And the best part is this bouncer is completely free.

5:07

Exum is available under the GNU general public license.

5:11

Which is a huge deal in the open source world.

5:13

It is.

5:13

That specific license is important,

5:15

because it doesn't just mean the software is free of charge.

5:18

It means the source can is completely open,

5:20

and anyone is legally guaranteed the right to study it, modify it,

5:24

and distribute it.

5:24

So anyone can look at the blueprints of the sorting

5:27

facility.

5:28

Exactly.

5:29

And for anyone who really wants to get into the weeds

5:31

and master how it all connects, the original author, Philip

5:35

Hazel, actually wrote a definitive book called

5:37

The Exum SMTP Mail Server.

5:40

But the sources do make a very clear recommendation

5:43

for the average user, right?

5:44

They do.

5:45

If you are running a standard Linux or Unix system,

5:49

you shouldn't try to download the raw code

5:51

and build this thing from scratch like a giant Lego set.

5:53

No, definitely not.

5:54

Unless you have highly specialized requirements,

5:57

they strongly advise using the prepackaged versions provided

6:00

by your operating system.

6:01

Yeah, let the package maintainers

6:03

do the heavy lifting.

6:04

I mean, compiling raw code into a functioning program

6:07

requires configuring it for the exact quirks

6:10

of your hardware and operating system.

6:11

Which sounds like a headache.

6:12

It is.

6:13

The volunteers who maintain Linux distributions

6:15

have already done that tuning for you.

6:18

And when we look under the hood of Exum,

6:19

you begin to understand why compiling and testing

6:22

this software is such a monumental task.

6:24

The scale of the project is just staggering.

6:27

When you look at their source repository,

6:29

there are 6,890 commits.

6:33

That's a massive history of updates.

6:35

Yeah, commit is basically a logged individual update

6:39

or fixed to the code over time, almost 7,000 of those.

6:43

But looking at the stats for how this is built,

6:46

I have to stop you and push back on something.

6:48

OK, what is it?

6:49

We are talking about the backbone of internet

6:51

communication, right?

6:52

Right.

6:52

And the code base is overwhelmingly written

6:55

in the C programming language.

6:57

Like, 92.3% of it is C.

6:59

Yeah, it's heavily reliant on C.

7:01

The rest is a mix, 4.4% Perl, 1.9% Shell,

7:05

and a tiny 0.4% fraction of Elixir.

7:09

But 92% C, that is a language from the 1970s.

7:12

It is an older language, yes.

7:13

And it requires the programmer to manually manage

7:16

computer memory.

7:17

Manual memory management is where so many catastrophic software

7:20

bugs come from.

7:22

So why hold on to this ancient architecture?

7:24

It's a fair question.

7:25

Why wouldn't a community-driven project

7:27

just rewrite it in a safer, modern language like Rust?

7:31

Well, that is the ultimate debate in system-level

7:34

programming right now.

7:35

Why stick with C?

7:37

For one, you are dealing with a project that has been actively

7:40

developed for decades.

7:42

Rewriting millions of lines of foundational, tested logic

7:45

from scratch is just an operational nightmare.

7:48

OK, so it's a momentum thing.

7:49

Partly.

7:50

But more importantly, C is incredibly fast.

7:53

It operates very close to the hardware at what developers

7:56

call bare metal.

7:57

When your server is processing millions of emails an hour,

8:01

tearing apart headers, checking them

8:02

against global blacklists, and routing them

8:05

down different network pipes, you cannot afford software

8:07

bloat or translation layer.

8:09

This just need pure speed.

8:10

Exactly.

8:11

You need raw, high-performance, low-level system interactions.

8:14

Still, requiring volunteer programmers

8:17

to manually allocate and free up memory

8:19

for every single operation feels like walking

8:22

a tightrope without a net.

8:23

It can be risky, yeah.

8:24

I mean, one wrong step, one forgotten line of code,

8:27

and the program crashes.

8:28

Or worse, it creates a massive security hole.

8:31

Which brings us to how a project like this actually survives.

8:35

Rigorous, continuous, automated testing.

8:38

Ah, okay.

8:39

You mentioned the other languages in the repository,

8:41

the Perl, the Shell scripts, the Elixir.

8:44

While C handles the heavy lifting of routing the mail,

8:47

those other languages are largely used

8:49

for scripting, tooling,

8:50

and running the testing infrastructure.

8:52

But a community project doesn't have a corporate mega-budget

8:55

to buy warehouses full of servers

8:57

for all this testing, right?

8:59

No, they don't.

9:00

They rely on organizational sponsors,

9:02

and the sources explicitly highlight them.

9:03

Yeah, a company called Mythic Beasts

9:05

provides a virtual machine,

9:07

which is essentially a simulated computer

9:10

running on a larger server,

9:12

specifically for their test suite build farm.

9:15

Right, and a build farm is exactly what it sounds like.

9:17

It's a dedicated environment

9:19

whose only job is to automatically download

9:21

the latest version of the code, compile it,

9:23

and run thousands of simulated emails

9:26

and scenarios through it.

9:27

Just to see if anything breaks

9:28

before it gets released to the public.

9:30

Exactly.

9:31

They also get help from McStadium,

9:32

who provides a Mac mini for their build farm.

9:35

And that is a crucial detail.

9:37

Testing on a Mac mini ensures the code functions correctly

9:40

across Apple specific Unix architecture,

9:43

not just standard Linux servers.

9:45

You need to know the code works everywhere.

9:46

You do.

9:47

Furthermore, an organization called Schlitterman

9:50

handles the hosting and administration

9:52

of the entire Exum.org infrastructure.

9:55

And Mike Cardwell designed the website.

9:57

Right.

9:58

It really takes a village to run the internet.

10:00

You have these separate independent companies

10:02

donating server power and hardware

10:05

just so the Exum developers can constantly run their code

10:08

through the ringer.

10:09

They have to be absolutely certain that 92% C code base

10:13

doesn't have a typo that breaks global email.

10:16

Because when a typo or a logic error

10:18

does slip into a C program that sits on the open internet,

10:21

the consequences are immediate and severe.

10:23

Very severe.

10:24

Which leads directly into the security documentation

10:26

we reviewed and the very real danger of obsolescence.

10:29

Yes, this is critical.

10:31

According to the official site, the current version of XM

10:33

is 4.99.1.

10:36

And this isn't a fun feature update

10:38

with a fresh coat of paint.

10:39

No, not at all.

10:39

This is a strict security release.

10:41

The release notes are highly specific about this.

10:44

Version 4.99.1 was pushed out to address

10:48

what is called a remote heap corruption vulnerability.

10:50

Blikes.

10:51

Yeah.

10:52

The official tracking designation for this

10:53

is CVE 202567896 or internally as XM security 202512-09.1.

11:02

OK, remote heap corruption sounds highly technical.

11:05

If we go back to our sorting facility analogy,

11:08

how does this actually compromise the system?

11:10

Well, the heap is the massive warehouse floor

11:12

where workers temporarily place packages while they

11:15

figure out where they go.

11:16

OK, temporary storage.

11:17

Exactly.

11:18

In a C program, the heap is a pool of memory

11:21

used for dynamic temporary storage.

11:23

A remote vulnerability means a bad actor somewhere out

11:26

on the internet can trigger this without needing

11:28

a password or internal access.

11:30

Wow.

11:30

So they're just sending a bad package into the facility.

11:32

Right.

11:33

Imagine a bad actor sending a package through your facility.

11:35

But instead of writing a normal destination,

11:37

they write an address that is so overwhelmingly long,

11:40

it physically spills off the edges of the envelope.

11:42

Oh, I see.

11:43

It spills over and literally covers the digital instruction

11:46

manual of the sorting machine itself.

11:49

Because the programmer didn't set a hard limit

11:51

on how long that address could be in the memory.

11:53

Exactly, that manual memory management issue we discussed.

11:56

The machine gets confused.

11:58

When the machine tries to read its next operational command,

12:01

it's actually reading the malicious text

12:03

the attacker wrote in the address line.

12:05

That is wild.

12:06

So they are tricking the mail server

12:09

into running malicious code instead of just routing emails.

12:12

Yes.

12:13

They could potentially take over the entire program.

12:15

It is one of the most critical types

12:17

of vulnerabilities a network facing service can have.

12:20

Once they control the sorting machine,

12:22

they can intercept mail, use your server

12:24

to blast out millions of spam messages,

12:27

or pivot further into your network.

12:29

And the Exim project takes an incredibly hard line

12:31

on this in their documentation.

12:33

They do.

12:34

The sources state that all versions prior to 4.99.1

12:39

are now completely obsolete, period.

12:41

They even specifically call out the old 3.x releases,

12:44

the last of which was 3.36.

12:47

They point out the version 3.36 is 20 years obsolete

12:51

and should absolutely not be used.

12:53

It is rare to see official documentation be that blunt.

12:57

Usually software developers use softer language

12:59

like unsupported or deprecated.

13:02

Right, they try to be polite about it.

13:03

Exactly.

13:04

But calling it 20 years obsolete is a blaring warning siren.

13:08

If you are running version 3.36 today,

13:11

you aren't just out of date.

13:13

You are actively inviting attackers into your network.

13:16

And this brings up the core responsibility

13:18

of running internet infrastructure.

13:20

The EXIM developers offer maintenance releases

13:23

primarily for those package maintainers

13:25

we mentioned earlier.

13:26

And they offer beta versions and a specific testing directory

13:29

for administrators willing to test unreleased code

13:32

at their own risk.

13:33

But the developers cannot force you to update your server.

13:36

They can't just remotely push a patch to your specific machine.

13:38

No.

13:39

If you set up an EXIM server five years ago,

13:41

got it working, and just forgot about it.

13:43

You are a sitting duck.

13:44

You are a danger to your own organization

13:47

and honestly to the rest of the network

13:49

if your server gets hijacked.

13:51

The hard line on obsolescence is a cultural marker.

13:53

How so?

13:54

It's the project declaring that they provide

13:56

this incredibly powerful tool for free,

13:59

but the cost of entry is your constant vigilance.

14:02

I love that.

14:03

And that strong sense of culture, boundary setting,

14:05

and responsibility perfectly contextualizes

14:08

the biggest piece of news we found in the source repository.

14:11

The migration.

14:12

Exactly.

14:13

When you understand how fiercely independent this team

14:16

has to be to maintain the software,

14:19

their recent migration makes perfect sense.

14:21

The Exum project is undertaking a massive move

14:24

to gain total independence from big tech.

14:26

And this is a profound shift that

14:27

reflects a growing movement in how open source

14:30

projects operate today.

14:31

OK.

14:31

So here are the facts directly from the repository's

14:33

RiaDME file.

14:35

As of December 26, 2025, the Exum project

14:39

officially stopped using GitHub.

14:40

Which is huge.

14:41

They are no longer pushing any updates

14:43

to the world's most popular code hosting platform.

14:45

Instead, the master repository is now entirely

14:48

self-hosted.

14:49

Taking it all in-house.

14:50

Yeah.

14:52

It's running on their own instance

14:53

of a platform called Forgejo, located at code.exum.org.

14:58

You know, to understand the magnitude of this decision,

15:00

you have to look at the landscape of software

15:02

development.

15:03

For the last decade, GitHub, which is owned by Microsoft,

15:06

has been the absolute center of gravity

15:08

for open source software.

15:10

It's where almost everyone collaborates, tracks issues,

15:13

and publishes code.

15:14

I mean, when GitHub goes down, half the internet's

15:17

developers suddenly can't work.

15:19

Exactly.

15:20

Leaving GitHub is not a casual decision.

15:22

It is an enormous operational burden.

15:25

So what is Forgeo, then?

15:26

Forgeo is a lightweight, community-managed software

15:30

forge.

15:31

It does what GitHub does, hosting code, tracking changes,

15:34

managing collaboration.

15:35

But you can install it on your own server.

15:37

So Exum's is taking the entire postal service infrastructure

15:41

and moving it out of the corporate landlord's building

15:43

into a facility they own themselves.

15:46

That's exactly it.

15:47

And if we connect this to the ethos of open source

15:49

that we've been discussing, the GNU license,

15:51

the volunteer community, the donated hardware

15:54

for the build farm, it aligns perfectly.

15:56

It's all about independence.

15:57

Right.

15:58

When you rely on a centralized, corporate-owned platform

16:02

to host your code, you are fundamentally

16:04

renting your digital home.

16:06

You are subject to their changing terms of service,

16:08

their algorithms, their AI data-scraping policies,

16:12

and their potential downtime.

16:13

For a project that literally acts

16:15

as the foundational infrastructure

16:17

of the open internet, being beholden

16:20

to a single corporate entity is a massive vulnerability.

16:24

It's a huge risk.

16:25

They are treating reliance on Microsoft's GitHub

16:27

the same way they treat a memory leak in their C code

16:30

as a risk that needs to be mitigated.

16:32

Total sovereignty over the tools that build the tool.

16:35

By hosting their own code on Fortjose,

16:37

they guarantee that no corporate entity can ever

16:39

pull the plug on their repository

16:41

or change the rules of access.

16:42

Wow.

16:43

Furthermore, the documentation outlines

16:45

their entire decentralized workflow.

16:48

Their bug tracking is currently handled

16:50

through an independent instance of a tool called Bugzilla

16:53

located at bugs.exim.org.

16:56

Though the notes mentioned they will soon migrate

16:58

that bug tracking directly into the new

17:00

for JoJo repositories issues section, right?

17:02

To centralize everything in their own system.

17:04

And they aren't relying

17:05

on corporate communication tools either.

17:08

They aren't setting up a slap workspace or a discord server.

17:10

No, not at all.

17:11

Development discussions happen the old fashioned

17:13

decentralized way on the EximDev mailing list.

17:17

General help and community troubleshooting

17:20

happen on the Exim user's mailing list.

17:21

They're using email to build email.

17:24

Right, it is a complete ecosystem

17:26

built on the very email protocols they champion.

17:29

They are literally eating their own cooking.

17:31

It is a strong statement that the open web is still viable.

17:34

You don't have to surrender your workflow,

17:36

your data or your community to a tech giant

17:39

just for the sake of convenience.

17:41

But it takes a staggering amount of work

17:43

to pack up your digital house

17:45

and move your entire community to a self-hosted platform.

17:48

It's exhausting just thinking about it.

17:50

But the freedom on the other side

17:51

is clearly worth it to this team.

17:54

And this brings us to a crucial realization

17:56

about the internet as a whole.

17:57

We assume the internet just works.

18:00

We assume emails arrive, websites load

18:03

and data routes correctly.

18:04

But it's actually held together

18:05

by incredibly dedicated communities

18:08

writing complex code and running test farms

18:11

on donated servers.

18:12

Exactly. Exim's move to self-host on Forgeo

18:15

guarantees their independence for now.

18:17

But it does introduce a new provocative question

18:20

that every foundational open source project

18:23

will eventually have to face.

18:24

The succession problem.

18:25

Right.

18:26

Break that down for you, Yumi.

18:27

What exactly is this succession problem?

18:30

Well, consider the demographics.

18:31

Many of these foundational protocols

18:33

like the mail systems we rely on

18:35

were built by volunteers decades ago.

18:38

As the original architects and maintainers

18:40

age out or retire,

18:41

who inherits the keys to the internet's post office?

18:44

That's a scary thought.

18:45

It really is.

18:46

Will the next generation of developers

18:48

who are largely trained on modern languages

18:50

and centralized corporate platforms

18:52

be willing to learn manual memory management in C?

18:55

Let alone maintain self-hosted bug trackers.

18:58

Exactly.

18:59

Achieving digital sovereignty from big tech

19:01

is a massive victory today,

19:03

but the true test is whether this independent,

19:05

volunteer-driven model

19:06

can survive a generational handover.

19:09

That is a question every organization relying

19:11

on digital infrastructure needs to ponder.

19:14

Who holds the keys to your systems?

19:16

It's the most important question you can ask.

19:19

Which, frankly, brings us right back to our sponsor,

19:22

Safe Server.

19:23

Safe Server is entirely built around solving

19:26

that exact problem for your organization.

19:28

Because you really don't have to rent space

19:30

in a corporate walled garden

19:32

and just hope they don't change the rules

19:34

or hike the prices.

19:35

Exactly.

19:36

By switching to open source solutions

19:38

implemented by Safe Server, businesses, associations,

19:41

and other groups, gain massive cost savings

19:44

compared to those expensive proprietary software licenses

19:47

from Google or Microsoft.

19:49

And beyond the cost, just like the Exum project,

19:52

you take back your data sovereignty.

19:54

Yes.

19:55

You control your infrastructure,

19:56

which is vital for compliance, legal audits,

19:59

and protecting your communications.

20:00

Whether you need a direct replacement

20:02

for your workspace tools,

20:03

or you just need specialized consulting

20:05

to figure out if a comparable alternative

20:07

is the right fit for your specific organizational needs,

20:10

Safe Server is there to help.

20:11

They make the transition manageable.

20:13

They really do.

20:14

So reclaim your infrastructure

20:16

by visiting www.safeserver.de.

20:19

It's all about understanding how the machinery works

20:21

so you can make it work for your specific needs

20:24

on your own terms.

20:26

Beautifully said.

20:27

So next time you type out an email

20:28

and click that send button,

20:30

take a second before you assume it's just magic.

20:33

Picture that massive digital sorting facility.

20:35

Think of the 92% C code.

20:37

The rigorous automated testing running on donated Mac minis

20:40

and the fiercely independent community

20:42

ensuring that your message finds its way through the dark.

20:45

The magic isn't in the button you click.

20:47

It's in the invisible open source infrastructure

20:50

that catches it.

20:51

We'll catch you next time.

20:51

We'll catch you next time.