ietf
[Top] [All Lists]

Re: IETF solution for pairing cellular hosts

2007-09-25 09:54:36
Hello,

On 25 Sep 2007 16:33:32 -0000, John Levine <johnl(_at_)iecc(_dot_)com> wrote:

1. The querier user types the target user's "human name" (as if he were
  consulting a phonebook), or a pseudoynm.
2. The pairing request is forwarded to the target phone.
3. The query, along with the querier user's name, are displayed on the
  target phone's screen.

I have a list of 250,000 people here (scraped off web sites) to whom
I'd just love to make recorded phone calls.  Can I use your protocol
to ask them all if it's OK?  If not, why not, and how are you going to
stop me?


Using a Turing test (CAPTCHA) for example.

http://en.wikipedia.org/wiki/Captcha

When you make a request, the target phone returns a captcha. If you
don't provide the right solution, the target user won't even see your
request, it will be dropped. Captcha's difficulty can be adaptively
tuned by the target phone..

So another step should be added to the above description.

I hope this answers your question!

Regards,
pars



Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet 
for
Dummies",
Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor
"More Wiener schnitzel, please", said Tom, revealingly.


_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf