The big problem with blocking GA altogether is that GA is usually how people who put together websites find out what browsers people are using to browse those websites.
And if you’re about to say “But they can just look at the user agent in access.log!”, sure they can, but those are in logs that are accessed by sysadmins, not people trying to find out how their websites are used. The first thing someone who’s trying to find out how to optimize their website does is go into GA. If they see no Firefox users in GA, then they don’t care about Firefox compatibility. They may even filter it out to prevent bots.
In order to fix the tracking cookies thing we need to do more than block a popular tool for getting website metrics, we need to understand why it’s used and provide alternatives that respect privacy.
I use Zimbra with an external email gateway that only accepts authenticated email. Zimbra is pretty heavy (it’s intended to be a Microsoft Exchange replacement) but it at least has a huge amount of protection built-in to deal with spam and comes configured out of the box to not relay (well, outside of you setting up aliases and lists.)
That said, it’s not hard to find “incoming email only” configurations that deliver to local mailboxes only, for most email servers. The thing to avoid is having a single server configuration that tries to do both - accepting external email and sending locally originated email out. The configurations do exist to do that, but they’re confusing and tricky.
External email gateways… that bit is hard. I use a mail server I set up myself on a VPS. It does not listen on incoming port 25. It requires credentials. I did this largely because I was trying to send email out via Xfinity’s customer email relay, but the latter kept upping the authentication requirements until one day Zimbra just couldn’t be configured to use it any more. And each time they changed something, I wouldn’t find out until I noticed people had clearly not received the emails I’ve sent out.
VPSes are problematic as some IPs are blocked due to spam. There’s not much you can do about it if you’re stuck with a bad IP, so if you can find a way to send outgoing email via your ISP’s outgoing email server, do that. For Postfix, you can send out authenticated email using something like: in main.cf:
relayhost = [smtp.office365.com]:587 smtp_sasl_auth_enable = yes smtp_sasl_security_options = noanonymous smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd smtp_use_tls = yes
and in /etc/postfix/sasl_passwd:
[smtp.office365.com]:587 example@outlook.com:hunter2
So in summary:
Good luck.