PopUp Ad Service Beats PopUp Blockers

Found on Webadvantage on Tuesday, 20 January 2004
Browse Internet

A California rich media company has launched the Popstitial, a new way for advertisers and Web publishers to serve popup style advertising to web users who have popup blockers on their computer.

The "Popstitial' has been developed by FPBA Group, a rich-media technology company. While the popstitial doesn't defeat pop blockers, it instead determines whether a popup blocker is being used. If so, Popstitial then serves up a full-page advertisement that can either be a separate ad - using Flash, video, animation or static images - or the same style as the missed pop-up/pop-under.

Great. Just what everybody needed. If people decide not to be flooded with popups, advertisers should respect that. I can only recommend script-based localhost proxies; the possibility to add new rules makes it easy to modify the source of a website before the browser receives it and so eliminate annoying parts.

Anonymous TCP/IP to debut at CodeCon

Found on The Register on Wednesday, 14 January 2004
Browse Internet

The latest installment of the CodeCon trilogy has been unveiled, as the coders DIY technical conference brings a mix of old hands and bedsit coders to San Francisco next month.

Highlights of CodeCon 2004 include FunFS, a low latency, userspace file system; the in house source code management system that's been used by DEC/Compaq's microprocessor design team for the past five years, Vesta, and a presentation from Roger Dingledine on a second-generation anonymizing overlay to TCP/IP. "Freely available unpatented Onion Routing code has been a cypherpunk goal for more than a decade," note the organizers.

The event takes place over a long weekend (February 20 to 22) and registration is $95, with a $20 early bird discount. For value for money, it's one of the highlights of the calendar. Highlights of previous CodeCons have included the Peek-A-Booty anonymous browser, and Alluvium "swarm radio", a peer to peer broadcasting infrastructure that reminds the RIAA that their problems have only just begun.

Now let's see what RIAA comes up with when TCP/IP becomes anonymous. Perhaps they are already planning controlable systems, like TCPA (and I think that would be the a dream for many govs too).

Random Acts of Spamness

Found on Wired on Monday, 12 January 2004
Browse Internet

"Daphnia blue-crested fish cattle, darkorange fountain moss, beaverwood educating, eyeblinking advancing, dulltuned amazons...."

This is not a failed attempt at free-form prose. It's a snippet of a spam message intended to promote a sexual stimulant, a deliberate crack at sneaking past and spoiling some of the most popular antispam filters.

By throwing a hundred or so random words rarely used in sales spiels into each e-mail missive, spammers hope to thwart Bayesian filters by making the spam appear to be personal correspondence.

The strange strings of words, which usually appear at the bottom of spam and sometimes in the subject line, are automatically added by spammers' mass-mailer software, according to Steve Linford of Spamhaus, an antispam advocacy organization.

"This random noise is technically known as a 'hash buster,'" Linford explained. "Hashing" is a technique used by some spam filters to quickly compare incoming mail to known spam.

Somehow, it really is useful. My filters are especially trained to recognize hash-busters, and every spam that gets through helps to make them better.

Spammers not deterred by Can Spam Act

Found on The Register on Saturday, 03 January 2004
Browse Internet

As expected, spammers don't seem too impressed with the US Can Spam Act, which was enforced on January 1. Nor have they changed their tactics.

However, Spamhaus plans to fight back. Yesterday, it released its Exploits Block List (XBL), a real-time DNS-based database of IP addresses of illegal 3rd party exploits, including open proxies, worms/viruses with built-in spam engines, and other types of trojan-horse exploits utilized by spammers. This list is designed to sit alongside the Spamhaus Block List (SBL), which blocks incoming spam from direct spam sources. The combination of SBL and XBL enables ISPs to safely reject a high volume of incoming spam outright, Spamhaus says.

Surprise! Ok, who really thought that this law would work? Politicians should listen to insiders instead of quickly signing something that doesn't work at all.

Microsoft aims to make spammers pay

Found on BBC News on Friday, 26 December 2003
Browse Internet

Despite efforts to stem the billions of spam e-mails flooding inboxes, unwanted messages are still turning e-mail into a quagmire of misery.

Spammers send out tens of millions of e-mails to unsuspecting computer users every day, employing a myriad of methods to ensure their pills, loans and "requests for our lord" pleas fox e-mail filters.

The development has been called the Penny Black project, because it works on the idea that revolutionised the British postage system in the 1830s - that senders of mail should have to pay for it, not whoever is on the receiving end.

Now I have to admit that I haven't read lots of background information yet, but it sounds like there are workarounds. What if spammers simply add a previously solved puzzle to all their mails? After all, SMTP is a text-based protocol. Or perhaps there will just be a dramatic increase of worms generating millions of spam machines.