The problem is that, naturally, the spammers will start running the
tool over their spam before sending it and tweaking it until it
passes. This has happened for previous techniques.
As with system security and cryptosystems, you have to assume that the
enemy knows what techniques you are using and will move to evade them.
As folks talk about their favorite magic bullet to "solve" the problem,
they need to take note of the above point. It exemplifies why the task is
* Some spammers are subject to local laws.
Many are not.
* Some spammers are relatively cooperative and
seek to have a reasonable good community
relationship. Many do not.
* Some spammers are straightforward and even
cooperative. Others are highly deceptive.
So as we suggest mechanisms, we need to think hard about how effective they
will be and at what cost.
Dave Crocker <mailto:dave(_at_)tribalwise(_dot_)com>
TribalWise, Inc. <http://www.tribalwise.com>
tel +1.408.246.8253; fax +1.408.850.1850