Zero to Inbox: The Ultimate Step-by-Step Technical Setup Guide for Perfect Cold Email Deliverability
Introduction: Why The Best Copy Fails Without Infrastructure
The most dangerous threat to your outbound revenue isn’t a bad value proposition, a weak call to action, or a boring subject line. It is the spam folder. This is the silent revenue killer: you press send, the CRM reports "delivered," but your prospect never sees the message. You aren't getting rejected; you are being ignored by an algorithm.
Visibility precedes conversion. You can write Shakespearean copy, craft the perfect offer, and hyper-personalize every variable. It simply does not matter if the message never reaches the primary inbox. If your infrastructure is flawed, your brilliance is screaming into the void.
The Foundation of Modern Sales
Technical Deliverability is the bedrock of a functional outbound engine. It is the complex interplay of domain reputation, DNS authentication protocols, and warming patterns that convinces Google and Outlook that you are a legitimate sender, not a spammer. Without this foundation, your sales team is building a skyscraper on quicksand.
What This Guide Is (And What It Is Not)
Let’s set the expectation immediately: This is not a copywriting guide. You will find no advice here on hooks, angles, or closing techniques.
This is a technical, backend tutorial designed for operators who need to solve the engineering problem of email placement. We are going to configure the plumbing of your sales operation.
The "Zero to Inbox" Roadmap
By following this guide, you will execute a forensic setup of your email infrastructure. We will cover every necessary step to take you from a raw domain to a fully warmed, trusted sender identity. The roadmap focuses on two critical objectives:
- Protecting Your Asset: Isolating your primary corporate domain to ensure your main business operations are never blacklisted.
- Maximizing Placement: configuring technical records (SPF, DKIM, DMARC) to achieve a near-100% deliverability rate to the primary inbox.
Prepare your DNS settings. It is time to build.
1. Strategic Domain Architecture: Protecting the Mothership
Cold outreach is an inherently risky activity for a domain's sender reputation. If you send volume from your primary domain (e.g., `company.com`) and hit a spam trap or incur a high bounce rate, you risk blacklisting your entire organization. This does not just affect marketing; it cripples internal communication, calendar invites, and critical transactional emails to existing clients.
To mitigate this risk, you must adopt an isolation protocol. You never send cold emails from your primary domain. Instead, you construct a fleet of secondary domains designed solely for outreach. If a secondary domain burns, you discard it and replace it. The primary domain—the "Mothership"—remains untouched.
The Isolation Protocol
You need to purchase distinct domains that are variations of your primary brand name. These domains serve as a firewall. If `google.com` is your main business, your outreach happens on `getgoogle.com` or `googleapp.com`.
Why this is non-negotiable:
- Risk Containment: A burned domain can be replaced for $12. A burned primary domain requires a total rebrand.
- Volume Scaling: Google Workspace and Outlook impose sending limits per domain. By using multiple secondary domains, you can horizontally scale your sending volume without triggering rate limits.
TLD Hierarchy: Reputation by Extension
Not all Top-Level Domains (TLDs) are created equal in the eyes of spam filters. Email Service Providers (ESPs) assign reputation scores to specific extensions based on historical abuse data.
- The Gold Standard (.com): Always prioritize `.com`. It is the most trusted extension globally and carries the highest inherent deliverability score.
- Acceptable Alternatives (.net, .io, .co): If the `.com` variant is unavailable, `.net` and `.io` are acceptable, particularly in the tech sector. `.co` is viable but slightly less authoritative.
- The Blacklist Zone (.xyz, .biz, .info, .online): specific TLDs are available for pennies, making them the preferred tools of scammers and bot farms. Consequently, spam filters like Barracuda and Spamhaus penalize these extensions heavily. Sending cold email from a `.xyz` address puts you at a disadvantage before you even write the subject line.
Naming Conventions
Your secondary domains must look legitimate to the recipient. Use prefixes and suffixes that imply action or organization structure.
Effective naming patterns:
- Prefixes: `get[Brand].com`, `try[Brand].com`, `use[Brand].com`, `ask[Brand].com`
- Suffixes: `[Brand]hq.com`, `[Brand]app.com`, `[Brand]labs.com`, `[Brand]team.com`
The Trust Bridge: Domain Forwarding
When a prospect receives a cold email, a percentage of them will manually type the domain into their browser to verify your legitimacy. If `getcompany.com` leads to a blank page or a "Parked Domain" error, you lose credibility immediately.
You must set up a 301 Redirect (Permanent Redirect) from every secondary domain to your primary website.
Implementation Rules:
- Root Domain Forwarding: Ensure `http://getcompany.com` forwards to `https://company.com`.
- Protocol Consistency: Ensure the SSL certificate is valid on the secondary domain so the redirect occurs seamlessly without browser security warnings.
- Consistency: The landing page they arrive at must match the branding in your email signature.
By forwarding domains, you create a seamless user experience where the prospect interacts with the secondary domain for email, but consumes content from the primary, high-authority website.
2. The DNA of Deliverability: SPF, DKIM, and DMARC
Email authentication is not optional. Google and Yahoo have enforced strict requirements for bulk senders, meaning missing or misconfigured records will result in automatic blocks. These three protocols form the cryptographic chain of custody that proves you are who you say you are.
SPF (Sender Policy Framework): The ID Card
SPF is the foundational layer of email authentication. It functions as a digital ID card presented to the receiving server (like Gmail or Outlook) to prove that the IP address sending the email is authorized to do so on behalf of your domain.
Technically, SPF is a DNS TXT record that lists all authorized sending IPs and third-party tools (such as Google Workspace, Outlook, or cold email sending platforms). When an email arrives, the receiving server queries your DNS. If the sending IP is not found in your SPF record, the email fails authentication.
Key Technical Considerations:
- Syntax: Always starts with `v=spf1`.
- The 10-Lookup Limit: The RFC 7208 standard limits SPF records to 10 DNS lookups. If you authorize too many vendors (e.g., `include:_spf.google.com`), you will exceed this limit, causing a "PermError" and causing emails to land in spam. Flatten your SPF records if necessary.
- Hard Fail vs. Soft Fail: Use `~all` (Soft Fail) or `-all` (Hard Fail) at the end of the record. While `-all` is more secure, `~all` is generally safer during the initial setup phase to prevent delivery issues during propagation.
DKIM (DomainKeys Identified Mail): The Wax Seal
While SPF verifies the *sender*, DKIM verifies the *message integrity*. Think of this as a tamper-proof wax seal on an envelope. It ensures that the email content has not been altered between the time it left your server and the time it arrived at the recipient's inbox.
DKIM utilizes asymmetric cryptography:
- The Private Key: Stored securely on your sending server (e.g., Google Workspace or Microsoft 365). It creates a unique cryptographic signature for the email header.
- The Public Key: Published in your DNS records.
When the receiving server gets the email, it retrieves the public key from your DNS to verify the signature created by the private key. If the keys match, the "wax seal" is intact. If they do not, the email is flagged as compromised.
DMARC (Domain-based Message Authentication, Reporting, and Conformance): The Rulebook
DMARC is the governance layer that unifies SPF and DKIM. It acts as the rulebook telling the receiving server exactly what to do if an email fails SPF or DKIM checks. Without DMARC, a receiving server decides the fate of unverified emails arbitrarily; with DMARC, you dictate the policy.
DMARC also provides a feedback loop, sending you reports on who is sending email on your behalf (authorized or unauthorized).
The Three Policy Stages:
- `p=none`: Monitoring Mode. The receiver reports authentication failures but takes no action. This is the starting point for all new domains to gather data without risking deliverability.
- `p=quarantine`: Suspicion Mode. Emails failing checks are sent to the spam folder.
- `p=reject`: Enforcement Mode. Emails failing checks are bounced immediately. This is the ultimate goal for domain security but requires perfect SPF/DKIM alignment.
Protocol Implementation: Adding TXT Records to DNS
You must add these protocols as TXT records in your domain's DNS settings. While the interface varies slightly between providers (Namecheap, GoDaddy, Cloudflare), the logic remains constant.
1. Locate DNS Management Log into your domain registrar and navigate to the DNS Management or Advanced DNS section for the domain you are configuring.
2. Add the SPF Record
- Type: TXT
- Host/Name: `@` (This represents the root domain. Some providers require you to leave this blank).
- Value/Content: `v=spf1 include:_spf.google.com ~all` (Replace the include mechanism with your specific email provider, e.g., `spf.protection.outlook.com` for Office 365).
- TTL: Set to Automatic or 1 Hour (3600 seconds).
3. Add the DKIM Record
- Generate the Key: Go to your email provider's admin console (e.g., Google Workspace Admin > Apps > Gmail > Authenticate email) to generate the DKIM key.
- Type: TXT
- Host/Name: This will be a selector provided by your email host, usually looking like `google._domainkey`. *Note: If your provider appends the domain name automatically, only enter the selector part.*
- Value/Content: Paste the long alphanumeric string provided by your email host (starting with `v=DKIM1; k=rsa; p=...`).
- TTL: 1 Hour.
4. Add the DMARC Record
- Type: TXT
- Host/Name: `_dmarc`
- Value/Content: `v=DMARC1; p=none; rua=mailto:dmarc-reports@yourdomain.com`
- *Note:* `rua` defines where the XML reports are sent. Replace with a monitored email address.
- TTL: 1 Hour.
5. Verification DNS propagation can take up to 48 hours, though it often resolves in minutes. Use a third-party tool like MXToolbox or a terminal command (`dig txt yourdomain.com`) to confirm the records are live and error-free.
3. Custom Tracking Domains: The Hidden Spam Trigger
Most cold emailers obsess over their copy but ignore the technical infrastructure of the links inside that copy. If you use the default tracking settings provided by tools like Instantly, Apollo, or Smartlead, you are committing a critical error before you send a single email.
The Problem: Shared Reputation
When you enable open or click tracking, your Email Sending Provider (ESP) rewrites the links in your email and inserts a 1x1 tracking pixel. By default, this pixel is hosted on a generic domain owned by the ESP (e.g., `track.shared-domain.com`).
Thousands of other users are using that exact same tracking domain. If a handful of those users send spam, Phishing scams, or low-quality blasts, the major inbox providers (Google, Outlook) will blacklist that shared domain. Because your email contains a link to that blacklisted domain, your email goes straight to spam, regardless of your content quality.
You must isolate your reputation. You do this by setting up a Custom Tracking Domain. This replaces the shared generic link with a URL that is unique to you (e.g., `link.getcompany.com`).
Step-by-Step Setup Guide
To set this up, you need to create a specific DNS record called a CNAME (Canonical Name). This tells the internet that a subdomain on your website points to your email tool's servers, allowing them to track activity using *your* branding.
Prerequisites:
- Access to your domain registrar (Namecheap, GoDaddy, Cloudflare, etc.).
- The "Target" value provided by your email tool (e.g., `prox.instantly.ai` for Instantly or `custom-tracking-url.apollo.io` for Apollo).
#### 1. Access DNS Management
Log in to your domain registrar and navigate to the DNS Records or DNS Management section for the domain you are using to send emails.
#### 2. Create the CNAME Record
Add a new record with the following configurations:
- Type: `CNAME`
- Host / Name: This is the subdomain prefix. Common standards are `link`, `track`, or `inst`. For the example `link.getcompany.com`, you would enter:
- `link`
- Value / Target: Paste the specific tracking URL provided by your sales engagement platform.
- *Example:* `prox.instantly.ai`
- TTL (Time to Live): Set to `Automatic` or `3600` (1 hour).
#### 3. Cloudflare Specifics (Crucial Step)
If you are using Cloudflare for your DNS, you must turn the Proxy Status to OFF (Grey Cloud / "DNS Only").
- If you leave the Proxy on (Orange Cloud), Cloudflare will try to cache the tracking pixel, which will break the SSL certificate and cause the tracking links to fail, resulting in hard bounces or warning banners in your prospect's inbox.
#### 4. Finalize in Your Email Tool
Once the DNS record is saved:
- Go back to your email sending tool's settings menu (usually under "Deliverability" or "Domain Setup").
- Input your full custom domain URL (e.g., `link.getcompany.com`).
- Click "Check Status" or "Verify".
- Wait for the SSL certificate to generate. This can take anywhere from 10 minutes to 24 hours depending on the provider.
The SSL Verification
Never send a campaign until your custom tracking domain has a valid SSL certificate (HTTPS). Modern email clients, particularly Gmail, will flag non-secure (HTTP) tracking links as dangerous.
To verify this manually, type your new tracking URL (e.g., `https://link.getcompany.com`) into a browser.
- Success: You should see a blank page, a "404 Not Found" (that is branded by your tool), or a specific success message from your ESP.
- Failure: If you see a browser security warning ("Your connection is not private"), do not launch your campaign. Wait for the SSL to propagate or contact support.
4. Workspace Configuration & "Human" Signals
Perfect DNS records authenticate the server; workspace configuration authenticates the sender. Major Email Service Providers (ESPs) like Google and Microsoft utilize behavioral fingerprinting to distinguish between legitimate business communications and automated bot farms. An account lacking specific "human" metadata is statistically more likely to be treated as spam, regardless of technical authentication.
Professional Workspace Setup
Do not use free tier accounts (`@gmail.com` or `@outlook.com`) for cold outreach. You must utilize enterprise-grade infrastructure—specifically Google Workspace or Microsoft 365. These platforms possess high-reputation IP pools and are the standard environment for B2B communication.
Once the account is provisioned, configure the internal identity settings immediately:
- Display Name: Use a real name (e.g., "John Doe"), not a generic role (e.g., "Sales Team," "Info," or "Support"). Generic aliases trigger promotional categorization and lower open rates.
- Recovery Information: Add a valid mobile phone number and a secondary recovery email address. ESPs view accounts without recovery paths as disposable burner accounts, which drastically lowers your internal trust score.
The Profile Picture: A Critical Trust Signal
One of the most overlooked variables in deliverability is the profile picture. Algorithms prioritize engagement; an email that includes a visual avatar is more likely to be opened. Furthermore, a missing profile picture is a strong heuristic signal of a programmatic bot.
You must implement your profile image across two specific layers to ensure visibility across all receiving mail clients.
#### 1. Internal Ecosystem (Google/Microsoft Profile)
If you are sending via Google Workspace, upload a high-resolution professional headshot directly to your Google Account settings.
- The Strategy: When you email a prospect using Gmail, this photo appears next to the subject line *before* they open the email.
- The Rule: Use a human face, not a company logo. Logos are frequently categorized as "Promotions" or "Marketing" by Gmail’s classification AI, whereas human faces are categorized as "Primary."
#### 2. The Universal Avatar (Gravatar)
Many non-Google email clients (Superhuman, Apple Mail, Thunderbird) do not pull images from Google's internal directory. Instead, they rely on the Gravatar (Globally Recognized Avatar) database.
- Create an account at [Gravatar.com](https://gravatar.com).
- Link your specific cold email address to the account.
- Upload the *exact same* headshot used in your Google/Microsoft profile to maintain consistency.
By populating these fields, you are manufacturing a consistent digital footprint. When a receiving server sees a sender with valid DNS, a configured workspace, and a globally recognized avatar, the "bot probability" score drops to near zero, significantly increasing your chances of landing in the Primary Inbox.
5. The Warming Protocol: Ramping Up Reputation
Email warming is the mandatory process of establishing a sender reputation with Email Service Providers (ESPs) like Google and Microsoft. When you purchase a new domain, it possesses a "neutral" reputation. To an ESP, a neutral reputation is synonymous with a suspicious reputation.
ESPs operate on a "guilty until proven innocent" basis. Because spammers frequently purchase new domains, blast thousands of emails immediately, and abandon the domain once blacklisted (a technique known as "burning"), any new domain exhibiting high volume is immediately flagged.
To bypass these filters, you must simulate organic human behavior. This involves gradually increasing sending volume and achieving high engagement rates (opens and replies) over a period of 14 to 21 days.
Automated vs. Manual Warming
There are two methods to build this reputation: manual interaction and automated peer-to-peer (P2P) networks.
Manual Warming This involves sending emails to colleagues, friends, or your own personal email addresses and manually replying to them.
- Pros: Highly authentic signals; you control the content and the reply loops.
- Cons: Unscalable. It is impossible to manually simulate the volume required to safely send 50+ cold emails per day per inbox.
Automated Warm-up Tools These tools connect your inbox to a P2P network of thousands of other real inboxes. The software automatically sends emails from your account to other users in the pool and vice versa.
- Mechanism: If your email lands in the recipient's spam folder, the tool automatically moves it to the Primary inbox (sending a critical positive signal to the ESP), marks it as read, and generates a reply.
- Necessity: For professional cold email infrastructure, automated warming is not optional; it is a requirement for maintaining deliverability at scale.
The 14-21 Day Ramp-Up Schedule
You must adhere to a strict sending curve. A sudden spike in volume—even after a week of warming—can trigger a spam trap.
Set your automated warm-up tool to the following parameters:
- Reply Rate: Set to 30% or higher.
- Ramp-Up Logic: Linear increase daily.
- Daily Limit: Cap at 40-50 emails per day per inbox.
The Volume Schedule
Do not deviate from this progression. The goal is to reach maximum capacity safely by the end of the third week.
- Day 1: 2 Warm-up emails
- Day 2: 4 Warm-up emails
- Day 3: 6 Warm-up emails
- Day 4: 8 Warm-up emails
- Day 5: 10 Warm-up emails
- Day 6: 12 Warm-up emails
- Day 7: 14 Warm-up emails
- Day 8: 18 Warm-up emails (Begin slight acceleration)
- Day 9: 22 Warm-up emails
- Day 10: 26 Warm-up emails
- Day 11: 30 Warm-up emails
- Day 12: 35 Warm-up emails
- Day 13: 40 Warm-up emails
- Day 14: 45 Warm-up emails
- Day 15+: Maintain 50 Warm-up emails daily.
Important: Do not launch your actual cold email campaigns until Day 15 at the earliest. Once you begin sending actual cold campaigns, do not turn the warm-up tool off. Keep it running in the background to offset the inevitable lack of replies from your cold prospects, maintaining a healthy overall engagement ratio for the domain.
6. Volume Control: Horizontal vs. Vertical Scaling
The most common failure point in cold email campaigns is greed. Attempting to maximize the output of a single email address triggers immediate algorithmic red flags at Google and Microsoft. To maintain high deliverability, you must decouple your total sending volume from individual inbox limits.
The Hard Limit: 30–50 Emails Per Day
Regardless of what your Email Service Provider (ESP) documentation says about "2,000 daily sending limits," those numbers apply to internal communication and established accounts, not cold outreach.
You must strictly cap sending at 30–50 emails per day, per inbox.
Exceeding this threshold pushes your activity outside the bounds of standard human behavior. Once an ISP detects automated, high-volume patterns from a single address, your domain reputation plummets, and your emails are routed to the spam folder. This limit includes both initial cold emails and automated follow-ups.
Vertical vs. Horizontal Scaling
To run a campaign requiring 500, 1,000, or 5,000 emails per day, you must change your scaling strategy.
- Vertical Scaling (The Wrong Way): Increasing the volume on a single email address (e.g., ramping `john@company.com` from 50 to 200 emails/day). This guarantees domain burnout.
- Horizontal Scaling (The Right Way): Increasing the number of domains and inboxes while keeping the volume per inbox static.
If your goal is 500 emails per day, you do not force one inbox to send 500 emails. Instead, you configure 10 separate inboxes, each sending 50 emails.
The Horizontal Architecture:
- Acquire Secondary Domains: Purchase variations of your main domain (e.g., `getcompany.com`, `trycompany.com`).
- Allocate Inboxes: Set up distinct user accounts on these domains (e.g., `john@getcompany.com`, `j.doe@trycompany.com`).
- Distribute Load: This spreads the risk. If one domain is flagged, your other nine domains continue to operate, protecting your main business domain from blacklists.
Inbox Rotation
Managing 20+ inboxes manually is impossible. This is where Inbox Rotation becomes a technical necessity.
Inbox Rotation is a feature found in advanced sales engagement platforms (such as Instantly, Smartlead, or Outreach). It acts as a load balancer for your email traffic.
- Unified Campaign: You upload your lead list to a single campaign.
- Rotational Sending: You connect all your horizontally scaled inboxes to that campaign. The software automatically distributes the outgoing emails across the connected accounts.
- Randomization: The tool rotates through the inboxes, ensuring no single account breaches the 30–50 daily limit.
By utilizing inbox rotation, you simulate a large sales team sending manually, rather than a single bot blasting thousands of messages. This is the only sustainable method for high-volume cold email.
7. Ongoing Hygiene: List Cleaning & Blacklist Monitoring
Perfect technical setup is not a "set it and forget it" milestone; it is merely the baseline. Deliverability is a living metric that fluctuates based on user engagement, bounce rates, and spam reports. Even a perfectly authenticated domain will be burned if you consistently email invalid addresses or hit spam traps.
To maintain the inbox placement you have engineered, you must implement a rigorous regimen of list hygiene and reputation surveillance.
Mandatory Pre-Send Verification
A hard bounce rate exceeding 2% is the fastest way to destroy your sender reputation. ESPs (Email Service Providers) like Google and Outlook view high bounce rates as a primary indicator of spamming activity. If you are guessing email formats or buying unverified lists, you are effectively attacking your own infrastructure.
You must run every single lead list through a verification tool before uploading it to your sending platform.
The Verification Protocol:
- Tooling: Use enterprise-grade verification services like ZeroBounce. Free or "cheap" verifiers often miss spam traps and return false positives.
- Filter Strictly: Only email leads marked as "Valid."
- Handle Catch-Alls: Addresses marked as "Catch-All" or "Accept-All" are risky. They cannot be 100% verified without sending an email. If you must send to these, segment them into a separate campaign using a burner domain to protect your primary sending infrastructure.
- Remove Invalid Syntax: Ensure no spaces, typos, or impossible domains exist in your CSV files.
Continuous Reputation Monitoring
You can be blacklisted without realizing it. A single report to a major Real-time Blackhole List (RBL) like Spamhaus or Barracuda can cause your open rates to drop to zero overnight.
You must proactively monitor your IP and domain reputation. Do not wait for your open rates to tank; check your health daily.
Surveillance Tools:
- MXToolbox: Use this for quick, daily health checks. It aggregates data from over 100 blacklists to see if your domain or sending IP has been flagged.
- GlockApps: Use this for deep-dive deliverability audits. GlockApps simulates campaigns to seed lists (test inboxes) at major providers (Gmail, Outlook, Yahoo) to tell you exactly where your emails are landing—Inbox, Promotions, or Spam.
The Blacklist Remediation Protocol
If your monitoring tools indicate you have hit a blacklist, follow this emergency protocol immediately:
- Cease Fire: Pause all campaigns associated with the affected domain or IP immediately. Continued sending will upgrade a temporary block to a permanent ban.
- Identify the List: Determine if the blacklist is high-impact (e.g., Spamhaus, SpamCop) or low-impact (minor lists that Google largely ignores). Focus your energy on the high-impact RBLs.
- Audit the Data: You likely hit a "Spam Trap"—an email address created solely to catch spammers. Review the list you sent to in the last 48 hours. If you did not verify that list via ZeroBounce, you must scrub it immediately or discard it entirely.
- Request Delisting: Go to the website of the RBL (e.g., the Spamhaus removal center). Follow their specific instructions to request removal.
- Warning: Most RBLs allow only one or two removal requests. If you request removal without fixing the root cause (the bad data), and you hit the trap again, you will be permanently blacklisted.
- Warm-Up Re-entry: Once delisted, do not resume full volume. Restart your warm-up process for 3-5 days to prove to ESPs that your traffic is legitimate again.
Conclusion: The Price of the Primary Inbox
Deliverability is not a game of chance; it is a function of strict technical compliance. The primary inbox is reserved for senders who prove, through cryptographic verification and behavioral patterns, that they are legitimate.
The architecture required to achieve this is non-negotiable. You cannot cherry-pick the components of a high-deliverability stack. It requires the total integration of five distinct pillars:
- Dedicated Infrastructure: Segregated sending domains that protect your primary corporate identity from reputation damage.
- Flawless Authentication: A rigid DNS foundation consisting of correctly aligned SPF, DKIM, and strict DMARC policies.
- Custom Tracking Domain: A dedicated CNAME record to prevent your reputation from being tethered to a shared, blacklisted tracking pixel.
- Automated Warm-up: A mandatory incubation period that establishes a baseline of positive engagement before a single prospect is contacted.
- Volume Discipline: Strict sending caps per inbox to mimic human behavior and evade algorithmic anomalies.
This system operates on a zero-tolerance policy. A single misconfigured record, a shared tracking link, or an impatient spike in sending volume acts as a single point of failure, compromising the entire operation. If one component is weak, your emails will land in spam, regardless of how perfect your copy is.
Do not launch your next campaign on assumptions.
Review your current infrastructure against the technical checklist provided in this guide immediately. If a step was skipped, pause your sending, rectify the configuration, and restart the warm-up protocol. The price of the primary inbox is precision. Pay it, or stay in spam.