On Wed, 29 Apr 2009, Jesse Thompson wrote:

A word of caution. Be very careful how you use the list. The intended usage for the list is to prevent (or monitor) local users from sending email to the listed addresses. The phishers frequently use compromised end-user accounts to receive the phishing replies, so there is a high risk of false positives, especially if you attempt to classify messages containing one these addresses as spam.

+1

Given the context of this information, the only safe way to use it is as a component of a meta that also requires phishy text fragments.

--
 John Hardin KA7OHZ                    http://www.impsec.org/~jhardin/
 jhar...@impsec.org    FALaholic #11174     pgpk -a jhar...@impsec.org
 key: 0xB8732E79 -- 2D8C 34F4 6411 F507 136C  AF76 D822 E6E6 B873 2E79
-----------------------------------------------------------------------
  You do not examine legislation in the light of the benefits it
  will convey if properly administered, but in the light of the
  wrongs it would do and the harms it would cause if improperly
  administered.                                  -- Lyndon B. Johnson
-----------------------------------------------------------------------
 9 days until the 64th anniversary of VE day

Reply via email to