ThinkingElixir 131: Start Securing Elixir and Phoenix Elixir/Phoenix Security: How attackers bypass IP based rate limiting

Phoenix Swoosh

In this episode we’ll use Swoosh and Phoenix Swoosh to send emails.

https://elixircasts.io/phoenix-swoosh