Last April I wrote an email to tmda-workers which described a technique that GMANE could use to provide a TMDA confirmed email forwarding system. I started out with this suggestion:
On Tue, Apr 09, 2002 at 10:51:23AM -0400, Mark Horn wrote: >I suppose you could use extension addresses so that >you could then encode the original email address into SOMETHING. That way >you don't have to keep a lookup table to translate SOMETHING into a real >address. > >So maybe SOMETHING is: > > [EMAIL PROTECTED] I recently got spam using this scheme - look at the sender address ([EMAIL PROTECTED] is my ISP provided email address which is forwarded to [EMAIL PROTECTED]): Date: Tue Feb 11 07:20:33 EST 2003 Sndr: [EMAIL PROTECTED] From: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subj: this girls best friend Actn: CONFIRM action_incoming (1643) What do you think the probability is that spammers are monitoring the TMDA (and other antispam) lists in order to get ideas on how to circumvent the techniques? Or is it more likely that whoever this was simply came up with the exact same scheme as I suggested? What's interesting to me is that I never use my "[EMAIL PROTECTED]" account. I don't think I've used it once, ever. This may, in fact, be the first email that it's ever been used in. I guess this is one thing that I really like about TMDA. Spammers can know everything TMDA does, but they're still going to have a really hard time figuring out how to circumvent it. _________________________________________________ tmda-workers mailing list ([EMAIL PROTECTED]) http://tmda.net/lists/listinfo/tmda-workers
