From owner-freebsd-questions@FreeBSD.ORG Fri Apr 10 18:29:26 2015 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id B10B61BD for ; Fri, 10 Apr 2015 18:29:26 +0000 (UTC) Received: from taos.firemountain.net (taos.firemountain.net [207.114.3.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "taos.firemountain.net", Issuer "taos.firemountain.net" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 73B3A2F for ; Fri, 10 Apr 2015 18:29:25 +0000 (UTC) Received: from gsp.org (localhost [127.0.0.1]) by taos.firemountain.net (8.14.9/8.14.9) with SMTP id t3AICtgo004946 for ; Fri, 10 Apr 2015 14:12:56 -0400 (EDT) Date: Fri, 10 Apr 2015 14:12:55 -0400 From: Rich Kulawiec To: freebsd-questions@freebsd.org Subject: Re: email address being harvested from ports website Message-ID: <20150410181255.GA2891@gsp.org> References: <5527D0BD.8060401@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5527D0BD.8060401@gmail.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 10 Apr 2015 18:29:26 -0000 This may be well-intentioned, but it demonstrates a nearly-complete lack of understanding of how spammers' address-harvesters work. The techniques in use in the field are very sophisticated and unlikely to be defeated by anyone who hasn't spent at least a decade studying them in detail. (And even then: probably not. The existence of hundreds of millions of 'bots changed the game markedly and there is no undoing that.) The ONLY reasonable course of action, at this point, is to presume that all email addresses are either (a) in the hands of spammers or (b) will be in their hands soon, and plan defenses accordingly. Any other approach is doomed to fail and should be instantly dismissed with prejudice: the only people it will impede in the slightest are non-spammers. ---rsk