Super Web Tech: Chronicling the Evolution of the Internet

Videoblogging, podcasting, bittorrent, RSS encoding -- these and other fascinating innovations are ushering the internet into a new technological era. You can learn valuable advice about a variety of cutting-edge developments when you have the *Super Web Tech* advantage.

Friday, July 22, 2005

How To Improve Blue Frog

Since I've given my opinions on the problems inherent in the Blue Frog system, I thought it would be proper to describe what I feel would make the idea more palatable.

*Remove Registry
I would be much more comfortable buying and downloading a program which works solely on my computer and not with a network of others. Perhaps it could become part of an email system (see Revamp Honeypots below). This minimizes the risk of my email address getting into the wrong hands while utilizing the beneficial response technology of Blue Frog. The program could access company databases when necessary, like when it is trying to determine whether a spammer's return address is spoofed.

*Spam Analysis
I have no doubt that this automated response system could be a boon to users, assuming it could analyze spam properly. This could come in the form of a database of known spammer addresses. When a person receives a spam, Blue Frog would access the central list of spammers, continuing with the procedure if the address or domain is a frequent offender. If it isn't, the letter goes to a specialist at Blue Security who determines whether or not the return address is spoofed. If everything checks out, she sends a command to the same Blue Frog program to continue the process.

*Revamp Honeypots
The honeypot concept is a good one, but I don't see the necessity of including valid and junk addresses together in any type of registry. Instead, users could sign up for a fully-functional email account and use this as their primary email address to post online or respond to questionable people. The account could be set to automatically forward mail to their main personal account if and when it passes all the filters. This keeps the real address out of the wrong hands by providing an effective buffer between the spammer and the user.

Overall, this is an intriguing technology that might just need to have some bugs worked out.

0 Comments:

Post a Comment

<< Home