On October 7, 1999 at 19:32, Jeff Breidenbach wrote:

> Also, the sender's email address is embedded at the top of the page, 
> scrambled by rot13 encryption. For example:
> 
>          <!-- MHonArc v2.4.3 -->
>          <!--X-Subject: week's news -->
>          <!--X-From-R13: Xrss Pervqraonpu <wrssNwno.bet> -->

I should note that the rot13 is slightly tweaked to include the
'@' character so stock spam bots will not even pick up anything.
This is just in case spam bots do rot13's on addresses they
harvest.

(BTW, I hope X-From-R13 does not throw-off Lynx since I read
that it apparently has code to look for MHonArc-like comments.
I think it is only for the message-id and subject.)

> You are correct that a programmer could write a custom spambot to
> crack the encryption. However, even if the encryption was strong, a
> custom spambot could just submit the POST form and record the mailto:
> URL returned.

Exactly.

> (1) Not everyone can whip out a custom spam harvester in perl in a few
>     minutes. Custom programming does represent some effort.

Basically, we hope address harvesting is done automatically.  It would
take human resources to check sites and to create custom variations to
beat obfuscation (which may not be economically viable for spammers).
Simple things like removing "nospam" can be done since many people put
that word in their address.  However, I hope what MHonArc does/can-do
avoid obvious anti-obfuscation, as is what Jeff does with the reply-to
button.

        --ewh

Reply via email to