<?xml version="1.0" encoding="utf-8" ?>

<rss version="2.0" 
   xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
   xmlns:admin="http://webns.net/mvcb/"
   xmlns:dc="http://purl.org/dc/elements/1.1/"
   xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
   xmlns:wfw="http://wellformedweb.org/CommentAPI/"
   xmlns:content="http://purl.org/rss/1.0/modules/content/"
   >
<channel>
    
    <title>Raymond P. Burkholder - Things I Do - Spam Containment</title>
    <link>https://blog.raymond.burkholder.net/</link>
    <description>In And Around Technology and The Arts</description>
    <dc:language>en</dc:language>
    <generator>Serendipity 1.7.2 - http://www.s9y.org/</generator>
    <pubDate>Sun, 10 Apr 2022 05:35:31 GMT</pubDate>

    <image>
        <url>https://blog.raymond.burkholder.net/templates/bulletproof/img/s9y_banner_small.png</url>
        <title>RSS: Raymond P. Burkholder - Things I Do - Spam Containment - In And Around Technology and The Arts</title>
        <link>https://blog.raymond.burkholder.net/</link>
        <width>100</width>
        <height>21</height>
    </image>

<item>
    <title>RBL, Reputation</title>
    <link>https://blog.raymond.burkholder.net/index.php?/archives/1188-RBL,-Reputation.html</link>
            <category>Spam Containment</category>
    
    <comments>https://blog.raymond.burkholder.net/index.php?/archives/1188-RBL,-Reputation.html#comments</comments>
    <wfw:comment>https://blog.raymond.burkholder.net/wfwcomment.php?cid=1188</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.raymond.burkholder.net/rss.php?version=2.0&amp;type=comments&amp;cid=1188</wfw:commentRss>
    

    <author>nospam@example.com (Raymond P. Burkholder)</author>
    <content:encoded>
    &lt;blockquote&gt;
 &lt;p&gt; look at &lt;a href=&quot;https://hetrixtools.com&quot; target=_blank&gt;Hetrixtools&lt;/a&gt; - 
It&#039;s not IP Reputation Service, but this tool can you can an idea with RBL Blacklist monitor maybe ?
  &lt;p&gt;There are only two IP-based reputation services that are truly widely used, world-wide, ours and Validity&#039;s (nee ReturnPath).  
  &lt;p&gt;&lt;a href=&quot;http://iadb.isipp.com&quot; target=_blank&gt;IADB (ISIPP Accreditation Database, now known to consumers as the Good Senders List, or GSL)&lt;/a&gt; - Ours have *always* been free for receivers to query, and always will be, as our primary reason for having been in business for going on 20 years is to provide a way for *receivers* to determine the ham from the spam (making it easier for them to reject spam).  I&#039;m surprised to hear that *any* of the others are charging for access for querying - shocked in fact.  More general information about the IADB is here: &lt;a href=&quot;https://www.isipp.com/for-isps/&quot; target=_blank&gt;for ISPs&lt;/a&gt;
 &lt;p&gt;FWIW - spamassassin checks the ISIPP by default since 3.10 and reduces
the score if your address is found there.
&lt;/blockquote&gt;

&lt;p&gt;2022/04/09 - &lt;a href=&quot;https://www.dnswl.org/&quot; target=_blank&gt;E-Mail Reputation&lt;/a&gt; – Protect against false positives - reputation data services - has a link to applications using the data, one of which being rspamd  -- but note: &quot;gmail&#039;s lack of cooperation with the dns good list means inbound from them
gets dropped when one of their outbound smtp senders gets badlisted,
which they often do. &quot;  -- followed up by: [How about using their SPF records as automation input?  Their MXes are
inside those blocks right now at least.]

&lt;p&gt;2022/04/09 - &lt;a href=&quot;https://hetrixtools.com/&quot; target=_blank&gt;HetrixTools&lt;/a&gt; - Uptime Monitor &amp;amp; Blacklist Monitor 
    </content:encoded>

    <pubDate>Sat, 09 Apr 2022 17:26:13 +0000</pubDate>
    <guid isPermaLink="false">https://blog.raymond.burkholder.net/index.php?/archives/1188-guid.html</guid>
    
</item>
<item>
    <title>Does Blockchain Malware Pay?</title>
    <link>https://blog.raymond.burkholder.net/index.php?/archives/1102-Does-Blockchain-Malware-Pay.html</link>
            <category>Spam Containment</category>
    
    <comments>https://blog.raymond.burkholder.net/index.php?/archives/1102-Does-Blockchain-Malware-Pay.html#comments</comments>
    <wfw:comment>https://blog.raymond.burkholder.net/wfwcomment.php?cid=1102</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.raymond.burkholder.net/rss.php?version=2.0&amp;type=comments&amp;cid=1102</wfw:commentRss>
    

    <author>nospam@example.com (Raymond P. Burkholder)</author>
    <content:encoded>
    &lt;p&gt;There are sites for that!

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://www.blockchain.com/btc/address/1F1ptimEAvcQPFoPsAckmrKiYL6c6h5NcN&quot; target=_blank&gt;BlockChain&lt;/a&gt; check for 1F1ptimEAvcQPFoPsAckmrKiYL6c6h5NcN - and with the ability to use that string as a content filter!
  &lt;li&gt;Supposedly something similar can be performed at https://www.spamhaus.org/query/hash/
  &lt;li&gt;By using it as a dnsbl, &lt;a href=&quot;https://btcblack.it/&quot; can be used as a filter
&lt;blockquote&gt;&lt;pre&gt;
$ host 1Mw9bvuPpVqM6vkQwaq4JQZCYe4ZmZse1R.bl.btcblack.it
Using domain server:
Name: 8.8.8.8
Address: 8.8.8.8#53
Aliases:

1Mw9bvuPpVqM6vkQwaq4JQZCYe4ZmZse1R.bl.btcblack.it has address 127.0.0.2
&lt;pre&gt;&lt;/blockquote&gt;
  &lt;/ul&gt; 
    </content:encoded>

    <pubDate>Sat, 03 Apr 2021 20:25:00 +0000</pubDate>
    <guid isPermaLink="false">https://blog.raymond.burkholder.net/index.php?/archives/1102-guid.html</guid>
    
</item>
<item>
    <title>Phishers can use social Web sites as bait to net victims: Informatics study Indiana University (05/24/07)</title>
    <link>https://blog.raymond.burkholder.net/index.php?/archives/66-Phishers-can-use-social-Web-sites-as-bait-to-net-victims-Informatics-study-Indiana-University-052407.html</link>
            <category>Spam Containment</category>
    
    <comments>https://blog.raymond.burkholder.net/index.php?/archives/66-Phishers-can-use-social-Web-sites-as-bait-to-net-victims-Informatics-study-Indiana-University-052407.html#comments</comments>
    <wfw:comment>https://blog.raymond.burkholder.net/wfwcomment.php?cid=66</wfw:comment>

    <slash:comments>0</slash:comments>
    <wfw:commentRss>https://blog.raymond.burkholder.net/rss.php?version=2.0&amp;type=comments&amp;cid=66</wfw:commentRss>
    

    <author>nospam@example.com (Raymond P. Burkholder)</author>
    <content:encoded>
    &lt;p&gt;Personally, I&#039;ve been able to identify phishing emails as they arrive, and promptly  delete them.  Indeed, some are quite tempting and realistic, but if one looks at the links  closely, the imposters can be separated from the real thing.

&lt;p&gt;If there is ever any confusion, I&#039;ll go the source directly, bypassing the link, and type 
in the correct link directly.

&lt;p&gt;An &lt;a href=&quot;http://www.acm.com&quot; target=_blank&gt;ACM Newsletter&lt;/a&gt; speaks of a study that 
show that separating the wheat from the chaffe is becoming more difficult.  Here is what 
they say:

&lt;blockquote&gt;Popular social network sites such as Facebook and MySpace are being used by 
cybercriminals to gather personal information to create targeted phishing attacks, according 
to Indiana University School of Informatics researchers. In their study, &quot;Social Phishing,&quot; 
the researchers established a baseline for the success rate of traditional and social 
network-based phishing attacks. Phishers steal personal information by sending authentic 
looking requests, either by email or instant messaging, asking someone to click on a link 
and submit their information on what looks like a legitimate Web site. &quot;Phishing has become 
such a prevalent problem because of its huge profit margins, ease in launching an attack, 
and the difficulty of identifying and prosecuting those who do it,&quot; says associate professor 
of informatics and computer science Filippo Menczer. &quot;Our study clearly shows that social 
networks can provide phishers with a wealth of information about unsuspecting victims.&quot; The 
study sent email messages to two groups of students asking them to enter their university ID 
and password. One group received an email from what they thought was a friend, while the 
other group received an email from a stranger. Only 16 percent of students who received an 
email from a stranger entered their information, while 72 percent of those receiving emails 
from &quot;friends&quot; gave away their information. Associate professor of informatics and member of 
the research team Markus Jakobsson says they were astonished by the 72 percent response 
rate. The researchers suggested some countermeasures to prevent phishing, including digital 
signatures on emails to verify the source, browser toolbars that alert users to spoofing 
attempts, spam filters that detect spoofed emails, and providing users with a secure path to 
enter passwords, alerting users that they are trying to authenticate to an unknown site. The 
study is scheduled to be published in the October 2007 issue of Communications of the ACM.
&lt;/blockquote&gt;

&lt;p&gt;The full article can be found at the &lt;a 
href=&quot;http://newsinfo.iu.edu/news/page/normal/5726.html&quot; target=_blank&gt;Indiana 
University&lt;/a&gt;. 
    </content:encoded>

    <pubDate>Fri, 25 May 2007 23:14:19 +0000</pubDate>
    <guid isPermaLink="false">https://blog.raymond.burkholder.net/index.php?/archives/66-guid.html</guid>
    
</item>

</channel>
</rss>
