[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[no subject]
- <!--x-content-type: text/plain -->
- <!--x-date: Fri Jan 2 14:01:51 2004 -->
- <!--x-from-r13: wxancxn ng xarheb.arg (Xbr Yancxn) -->
- <!--x-message-id: [email protected] -->
- <!--x-reference: 000401c3cc0c$35dd3830$0a00a8c0@atlas --> "http://www.w3.org/TR/html4/loose.dtd">
- <!--x-subject: [ale] OT: the Penny Black anti-spam proposal -->
- <li><em>date</em>: Fri Jan 2 14:01:51 2004</li>
- <li><em>from</em>: jknapka at kneuro.net (Joe Knapka)</li>
- <li><em>in-reply-to</em>: <000401c3cc0c$35dd3830$0a00a8c0@atlas></li>
- <li><em>references</em>: <000401c3cc0c$35dd3830$0a00a8c0@atlas></li>
- <li><em>subject</em>: [ale] OT: the Penny Black anti-spam proposal</li>
> Since many spammers just use others pc's I don't think the $/emails would
> work.
Agreed. I don't really see how the described proposal is any better
than a simple policy on the server end: don't accept more than N
messages per minute from any particular client (where a message is
defined as one email to one receiver - a single message with 1000 To:
lines would count as 1000 messages). And the "Penny Black" proposal
would be much, much harder to implement.
> Since many spammers are overseas I am not sure about the burning at the
> stake - however that would be a good job for the usually useless UN to do.
> I am for that.
>
> Reverse email verification could be worked around if you use an account you
> set up on a hacked machine or are overseas.
>
> What's needed is a massive campaign on the part of users to run up the
> spammers machines cpu to the point where it blows up. Then it would be easy
> for sys admins to find out if their system is being used for spam.
This idea is similar to Paul Graham's "Filters That Fight Back"
proposal <<a rel="nofollow" href="http://www.paulgraham.com/ffb.html">http://www.paulgraham.com/ffb.html</a>>. I had what I
thought was a better idea (<<a rel="nofollow" href="http://kneuro.net/programming/index.php?file=spam.html_content">http://kneuro.net/programming/index.php?file=spam.html_content</a>>), but Mr. Graham says that it's not as easy
as it looks, due to URL mangling done by many spammers.
> I dunno - I think the burning at the stake method is the best so far.
Sounds delightful!
Cheers,
-- Joe Knapka
--
(let ((antichrist 'me) (anarchist 'me))) -- the sexp-pistols.
If you really want to get my attention, don't reply to this;
instead, send mail to "jknapka .at. kneuro .dot. net."
</pre>
<!--X-Body-of-Message-End-->
<!--X-MsgBody-End-->
<!--X-Follow-Ups-->
<hr>
<!--X-Follow-Ups-End-->
<!--X-References-->
<!--X-References-End-->
<!--X-BotPNI-->
<ul>
<li>Prev by Date:
<strong><a href="msg00034.html">[ale] OT: Anybody sick today?</a></strong>
</li>
<li>Next by Date:
<strong><a href="msg00036.html">[ale] flat screen monitors on RH9</a></strong>
</li>
<li>Previous by thread:
<strong><a href="msg00104.html">[ale] OT: Anybody sick today?</a></strong>
</li>
<li>Next by thread:
<strong><a href="msg00041.html">[ale] Meeting Announcements?</a></strong>
</li>
<li>Index(es):
<ul>
<li><a href="maillist.html#00035"><strong>Date</strong></a></li>
<li><a href="threads.html#00035"><strong>Thread</strong></a></li>
</ul>
</li>
</ul>
<!--X-BotPNI-End-->
<!--X-User-Footer-->
<!--X-User-Footer-End-->
</body>
</html>