- Cost-based anti-spam systems
Since spam occurs primarily because it is so cheap to send, a proposed set of solutions require that senders pay some cost in order to send spam, making it prohibitively expensive for spammers.
Proof-of-work systems such as hashcash and Penny Black require that a sender pay a computational cost by performing a calculation that the receiver can later verify. Verification must be much faster than performing the calculation, so that the computation slows down a sender but does not significantly impact a receiver. The point is to slow down machines that send most of spam—often millions and millions of them. While every user that wants to send email to a moderate number of recipients suffers just a few seconds' delay, sending millions of emails would take an unaffordable amount of time. This approach suffers when sender maintains a computation farm of their own or from zombies.
Bonds or Sender-at-risk
As a refinement to stamp systems is the method of requiring that a micropayment only be made (or some other form of penalty imposed) if the recipient considers the email to be abusive. This addresses the principal objection to stamp systems: popular free legitimate mailing list hosts would be unable to continue to provide their services if they had to pay postage for every message they sent.
Bill Gates announced that Microsoft is working on a solution requiring so-called “unknown senders”, i.e. senders not on the Accepted List of the recipient to post “the electronic equivalent of a” stamp whose value would be lost to the sender only if the recipient disapproves of the email . Gates said that Microsoft favors other solutions in the short-term, but would rely on the contingent payment solution to solve the spam problem over the longer run. Microsoft, AOL as well as Yahoo! have recently introduced systems that allow commercial senders to avoid filters if they obtain a paid or pre-paid certificate or certification, which is lost to the sender if recipients complain.
This approach suffers when a user initially signs up for a legitimate mailing list, but then later decides they do not want to receive the e-mail any further. Lazy users will simply click the "This is Spam" button on their e-mail client, rather than going through the formal unsubscription process that is detailed at the bottom of each message. The end-user gets the same effect either way, but without realizing the consequences that the list host may now face. However, companies now implementing the penalty approach when certifying (and withdrawing certification from) commercial senders have learned to account for this problem by setting appropriate complaint thresholds.
The intent of all such "sender-at-risk" solutions, which impose a significant cost to the sender only if the recipient rejects the message subsequent to receiving the email, is to deter spam by making it economically prohibitive to send unwanted email messages, while allowing legitimate emailers to send messages at little or no expense.
Anti-spam activist Daniel Balsam attempts to make spamming less profitable by bringing lawsuits against spammers. While this approach is financially sustainable for the activist, it is questionable whether it actually reduces spam, either for the activist or for anyone else.
- ^ Jo Best (2004-01-26). "Gates reveals his magic solution to spam". CNET. http://news.com.com/Gates+reveals+his+magic+solution+to+spam/2100-1028_3-5147491.html.
- ^ Paul Elias, (December 26, 2010) Man quits job, makes living suing e-mail spammers Associated Press
- ^ Tom McNichol , June 2011 Spam, Spam and More Spam California Lawyer
Spamming ProtocolsOther Anti-spam Spamdexing Internet fraud
Wikimedia Foundation. 2010.
Look at other dictionaries:
Anti-spam techniques — To prevent e mail spam (aka unsolicited bulk email), both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users… … Wikipedia
Anti-spam techniques (e-mail) — To prevent e mail spam, both end users and administrators of e mail systems use various anti spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one… … Wikipedia
Spam (electronic) — An email box folder littered with spam messages A typical spam m … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
E-mail spam — E mail spam, also known as bulk e mail or junk e mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e mail. A common synonym for spam is unsolicited bulk e mail (UBE). Definitions of spam usually… … Wikipedia
Email spam — An email box folder filled with spam messages. Email spam, also known as junk email or unsolicited bulk email (UBE), is a subset of spam that involves nearly identical messages sent to numerous recipients by email. Definitions of spam usually… … Wikipedia
Daniel Balsam — is an American lawyer best known for his lawsuits against e mail spammers for violations of internet spam laws. Balsam has been filing lawsuits against spammers since 2002 and has earned over $1 million in court judgments. By filing lawsuits,… … Wikipedia
Geobytes — is a global company specializing in geolocation and anti spam software. Geobytes was incorporated in the State of Delaware, USA in 1999 making it one of the oldest companies in the online geolocation industry. Notoriety Geobytes was one of the… … Wikipedia
CAPTCHA — Early CAPTCHAs such as these, generated by the EZ Gimpy program, were used on Yahoo!. However, technology was developed to read this type of CAPTCHA … Wikipedia
Malware — Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access… … Wikipedia