R
The term you want is "wrong", not "confusing".
The downside is that I have no idea how many people try to contact me
out of the blue, or from an address other than the one I sent mail to,
but don't bother to answer the response.
Right. Nobody sends email to addresses that come off business cards,
or off a web site, or ....
I think one necessary function of email and USENET is that it should
allow you to SAFELY communicate with strangers or, worse, people
you know but do not trust at all,
Likewise I avoid emails that are broken. If it looks like it will contain
web-bugs, javascript exploits, or badly formatted unreadable text, then I
avoid any mail client that can't display it in plain text.
And by "looks like", I mean "contains any HTML".
And they don't know about attachments?
What makes you think I don't have a copy of Opera? Just so happens
I've got a registred copy on my newest computer.
My copy of Opera doesn't have that menu entry. I suspect you're making
platform-specific suggestions.
Formatted spam can include pictures of words. That's a common spam
tactic - send a multipart/alternative with a text part that look like
a letter from aunt jane - and mention that you're sending a
picture. The picture part is basically a jpeg of a flyer for the spam
companies product.
Pictures are not code. It is
unfair to tar them with the brush of JavaScript or the goofy things
Outlook does with enclosures.
Viruses can mail out change of address messages to everyone in the
compromised machine's address book today.
Of course, viruses don't bother doing that - since it's stupid and
pointless.
If you've compromised someone's machine there are typically lots more
rewarding things to do with it than spoof change-of-address notices.
Roedy Green said:As if what we are living with now were preferable to what I propose.
It is inertia. It is herd mentality that dare not leap out of the
current rut. It is not a particularly difficult technical problem. It
is figuring out how to get people to switch over.
Roedy Green said:This is why I wanted a protocol where that was automated.
Roedy Green said:Such a jpg would have a lot more sharp edges than a usual photo. Also
you tend to have areas of just two colours. Some edge detecting
software might have a go at it.
However, my rule of thumb is I would not accept photos from the
general public, only from a subset of my correspondendents. That
makes a photo a strong spam indicator.
But you also said (in said:Censoring content and style is none of our business.
Roedy Green said:or quoted :
You don't need 100% spam blocking to effectively solve the spam
problem. You just have to make spam uneconomic.
There was an analogous problem with telephone spam. It was even
easier for the telepest to get addresses, just add one. That was
solved by legal means. It could come back as long distance rates drop
and some country harbours them.
Summary: a buffer overflow problem in Microsoft's JPEG redering
library, used my almost all Windoze email and web clients, would allow
an attacker to execute any arbitrary code he wished on your computer
simply by tricking you into viewing a doctored JPEG image. Since
solved (this problem is _so_ last year, dahling), but it belies your
assertion that "pictures are not code."
Links
Javascript
Forms
References to other files
Want to reply to this thread or ask your own question?
You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.