Hello,
On 25 Sep 2007 16:33:32 -0000, John Levine <johnl(_at_)iecc(_dot_)com> wrote:
1. The querier user types the target user's "human name" (as if he were
consulting a phonebook), or a pseudoynm.
2. The pairing request is forwarded to the target phone.
3. The query, along with the querier user's name, are displayed on the
target phone's screen.
I have a list of 250,000 people here (scraped off web sites) to whom
I'd just love to make recorded phone calls. Can I use your protocol
to ask them all if it's OK? If not, why not, and how are you going to
stop me?
Using a Turing test (CAPTCHA) for example.
http://en.wikipedia.org/wiki/Captcha
When you make a request, the target phone returns a captcha. If you
don't provide the right solution, the target user won't even see your
request, it will be dropped. Captcha's difficulty can be adaptively
tuned by the target phone..
So another step should be added to the above description.
I hope this answers your question!
Regards,
pars
Regards,
John Levine, johnl(_at_)iecc(_dot_)com, Primary Perpetrator of "The Internet
for
Dummies",
Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor
"More Wiener schnitzel, please", said Tom, revealingly.
_______________________________________________
Ietf mailing list
Ietf(_at_)ietf(_dot_)org
https://www1.ietf.org/mailman/listinfo/ietf