Archive for the ‘spam’ Category.

Jon Udell on SpamBayes

Cloudmark starts to charge

Spam fallacies

Confessions of a former spammer

Confessions Of a Former Spammer:

“I know this all sounds like you’re hiding yourself and doing this illegitimately, but the reason you have to do it is everybody tries to shut you down,” Shiels said.

[via Techdirt]

Reputation

Ed Felten
comments on copyright owners flooding P2P networks with bogus data:

… my prediction is that at least some file-sharing vendors will try adopting reputation systems, and that after a few false starts they will find a way to make those systems at least modestly successful to combating decoy tactics …

and I cannot help but correlate this to the other network (SMTP email) being flooded with bogus data (spam), and, lo, by coincidence,
yesterday’s
TRIPOLI proposal from Lauren Weinstein’s proposal that can be roughly be described (my words) as web-of-trust or certification-of-reputation, applied to email.

TRIPOLI: An Empowered E-Mail Environment

Lauren Weinstein:
“TRIPOLI” — An Empowered E-Mail Environment (Overview):

A key aspect of the Tripoli environment is the concept of a third-party certified, encrypted authentication token that would be cryptographically linked with every e-mail message. Within the Tripoli architecture, this token is referred to by the acronym “PIT” (Payload Identity Token, henceforth referred to as “Pit”) and is at the core of Tripoli. The Pit contains all of the certified information necessary to authenticate the associated message payload. The sorts of information within the Pit include authenticating identity information, special or extra capability data, the level of identity authentication in force for this particular Pit and its associated message payload, and potentially a wide range of other related data to be defined in a continually extensible manner.


It is anticipated that in most cases, in order for the sender of an e-mail message to become initially certified by a Pit Certification Authority (PCA), the sender would need to first formally accept Terms of Service (ToS) that may well prohibit the sending of spam, and equally importantly, would authorize the certification authority to “downgrade” the sender’s authentication certification in the case of spam or other ToS violations.


Again, the overriding principle in Tripoli is that the receiver of e-mail makes the decisions and decides which messages they are willing to receive. Senders of e-mail are free to try proceed as they wish, but their ability to have their messages transmitted, received, and read will be ultimately controlled by e-mail receivers and readers.

Earthlink offers Challenge-Response Anti-Spam System

Trusted Email Open Standard (TEOS)

FTC: Most Spam At Least Partly False

Information Week: Category: LINKS, spam  |  Comment

OMPUAC: Online Marketing Professionals United Against Censorship

Online Marketing Professionals United Against Censorship
Anti-Habeas trade group:
“Habeas Threatens Incomes”