Last April I wrote an email to tmda-workers which described a technique
that GMANE could use to provide a TMDA confirmed email forwarding system.
I started out with this suggestion:

On Tue, Apr 09, 2002 at 10:51:23AM -0400, Mark Horn wrote:
>I suppose you could use extension addresses so that
>you could then encode the original email address into SOMETHING. That way
>you don't have to keep a lookup table to translate SOMETHING into a real
>address.
>
>So maybe SOMETHING is:
>
>       [EMAIL PROTECTED]

I recently got spam using this scheme - look at the sender address
([EMAIL PROTECTED] is my ISP provided email address which is forwarded
to [EMAIL PROTECTED]):

Date: Tue Feb 11 07:20:33 EST 2003
Sndr: [EMAIL PROTECTED]
From: [EMAIL PROTECTED]
  To: [EMAIL PROTECTED]
Subj: this girls best friend
Actn: CONFIRM action_incoming                                           (1643)

What do you think the probability is that spammers are monitoring the TMDA
(and other antispam) lists in order to get ideas on how to circumvent
the techniques?

Or is it more likely that whoever this was simply came up with the exact
same scheme as I suggested?

What's interesting to me is that I never use my "[EMAIL PROTECTED]"
account.  I don't think I've used it once, ever.  This may, in fact,
be the first email that it's ever been used in.

I guess this is one thing that I really like about TMDA.  Spammers can
know everything TMDA does, but they're still going to have a really hard
time figuring out how to circumvent it.


_________________________________________________
tmda-workers mailing list ([EMAIL PROTECTED])
http://tmda.net/lists/listinfo/tmda-workers

Reply via email to