Hi Bernd,

>      <FORM METHOD="POST" ACTION="/cgi-bin/Nomailto.pl">
>      <INPUT TYPE="HIDDEN" NAME="user" VALUE="bernd.paysan">
>      <INPUT TYPE="HIDDEN" NAME="host" VALUE="gmx.de">
>      [...]
>
>I took a look at the HTML source that is generated for a message, and
>I could easily extract my e-mail address out of a message [...]

Also, the sender's email address is embedded at the top of the page, 
scrambled by rot13 encryption. For example:

         <!-- MHonArc v2.4.3 -->
         <!--X-Subject: week's news -->
         <!--X-From-R13: Xrss Pervqraonpu <wrssNwno.bet> -->
         <!--X-Date: Wed, 29 Sep 1999 23:09:45 &#45;0700 -->
         <!--X-Message-Id: [EMAIL PROTECTED] -->
         <!--X-Content-Type: text/plain -->
         <!--X-Head-End-->

>Adapting a harvesting perl script for this is just a matter of
>minutes, then. I suggest encrypting the informations and decrypt it
>in the cgi-bin on your server to generate the mailto: URL.

Both rot13 and splitting up the email address in the POST form
are examples of weak encryption. I consider there to be only two
types of encryption -- weak (breakable) and strong (unbreakable).
I believe that the weak encryption will stop all stock spambots.

You are correct that a programmer could write a custom spambot to
crack the encryption. However, even if the encryption was strong, a
custom spambot could just submit the POST form and record the mailto:
URL returned.

Now, if I ran all incoming email through an anonymizing remailer, that
would probably do the trick -- at the cost of making it impossible to
reply to a piece of email. But, I'd prefer not to give up this
functionality -- it feels a little bit like giving in to terrorists.
Maybe there is room in the world for an anonymizing list archiving
service, but it's not a niche I purposely want to get into!

I like to think of the current anti-spambot measures as one of those
expensive U-shaped bicycle locks. It's reasonably difficult to
break(1) but by no means insurmountable. If the spammer is in the
United States, there may also be some discouragement provided by our
legal system. I would like to think that the spammer will choose an
easier target. Thus far, the situation appears to be working well. Of
course, I should probably mention that someone stole my bicycle a few
years ago despite the U-lock...

Anyway, your point is taken and I will try to amend the FAQ to more
realisticly reflect the situation. Thanks for the feedback.

Cheers,
Jeff

PS Your "Why Forth" page is fascinating.



(1) Not everyone can whip out a custom spam harvester in perl in a few
    minutes. Custom programming does represent some effort.

Reply via email to