<html><head><style>body{font-family:Helvetica,Arial;font-size:13px}</style></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;"><div id="bloop_customfont" style="font-family:Helvetica,Arial;font-size:13px; color: rgba(0,0,0,1.0); margin: 0px; line-height: auto;"><a href="http://wp.me">wp.me</a> is wordpress’ own url shortener, and I noticed today that mailscanner says this:</div><div id="bloop_customfont" style="font-family:Helvetica,Arial;font-size:13px; color: rgba(0,0,0,1.0); margin: 0px; line-height: auto;"><br></div><div id="bloop_customfont" style="margin: 0px;">MailScanner has detected definite fraud in the website at "wp.me". Do not trust this website: <a href="http://wp.me/p8jXWt-9A">http://wp.me/p8jXWt-9A</a> - this is definitely “not fraud”. I like the idea of pointing out that some links can be dangerous, but <a href="http://wordpress.com">wordpress.com</a> issues these shortened urls by default. How can I tweak the ideas of what mailscanner thinks of as fraud, etc. While one could argue that places like <a href="http://bit.ly">bit.ly</a>, goo.gl etc can hide malicious sites since individuals can craft these shortened URLs, <a href="http://t.co">t.co</a>, <a href="http://wp.me">wp.me</a> and <a href="http://ow.ly">ow.ly</a> are generally controlled by the owning sites. Should these warrant such a vehement warning?</div><br><div id="bloop_sign_1487192403769347072" class="bloop_sign"><b>Danita Zanrè</b>, <i>Move Out of the Office</i><div>I love my job, and you can too!</div><div>Tel: (720) 319-7530 - Caledonia Network Consulting</div><div>Tel: (720) 319-8240 - Move Out of the Office</div><div><div><br></div></div></div></body></html>