{"id":467,"date":"2008-06-12T00:02:09","date_gmt":"2008-06-12T05:02:09","guid":{"rendered":"http:\/\/arxivblog.com\/?p=467"},"modified":"2008-06-12T00:03:44","modified_gmt":"2008-06-12T05:03:44","slug":"let-the-spit-wars-begin","status":"publish","type":"post","link":"http:\/\/arxivblog.com\/?p=467","title":{"rendered":"Let the SPIT wars begin"},"content":{"rendered":"<p><a href=\"http:\/\/arxivblog.com\/wp-content\/uploads\/2008\/06\/spit.jpg\" title=\"SPIT\"><img decoding=\"async\" src=\"http:\/\/arxivblog.com\/wp-content\/uploads\/2008\/06\/spit.thumbnail.jpg\" alt=\"SPIT\" \/><\/a><\/p>\n<p>If SPAM arrives in your inbox at 4am, the chances are your antispam software will catch it. But even if it doesn&#8217;t, you won&#8217;t lose much sleep over its arrival.<\/p>\n<p>But it&#8217;ll be a different story with SPIT (spam over internet telephony). Junk phone calls at 4am are going to drive you mad because the chances are that antispit software won&#8217;t be able to intercept the call.<\/p>\n<p>Today, Andreas Schmidt and pals from the Fraunhofer-Insitute for Secure Information Technology in Darmstadt Germany explain why intercepting SPIT is so much harder than spotting SPAM.\u00a0 The main difference between junk calls and junk email is that the email arrives at your mail server before you access it. This gives the server time to analyse its content and filter out the junk before it gets to you.<\/p>\n<p>Internet telephony, on the other hand, goes straight through to you in (more or less) real time, giving your server little or no time to analyse its content.<\/p>\n<p>There are still a number of strategies that could be employed to filter out SPIT. For example, white lists that allow only calls from predetermined callers, Turing tests such as audio CAPTCHAs that make a caller prove he or she is human and payment-at-risk services where the caller makes a small payment in advance and is refunded immediately if the receiver acknowledges the call as legitimate.<\/p>\n<p>But Schmidt and pals don&#8217;t seem confident that these techniques will work. They happily point out the disadvantages of each strategy, showing how most are either impractical or easily\u00a0 circumvented by a determined spitter.<\/p>\n<p>They have even created a program that implements all of these attacks. Their idea is to use the program as a benchmarking tool against which people can test antispitting strategies.<\/p>\n<p>Spitting is a problem that is likely to get worse. Much worse, if the estimates are correct that as much as 90 per cent of email traffic is SPAM .<\/p>\n<p>So to all you computer security guys out there: hustle, hustle, hustle. I need my sleep.<\/p>\n<p>Ref: <a href=\"http:\/\/arxiv.org\/abs\/0806.1610\">arxiv.org\/abs\/0806.1610<\/a>: Spam over Internet Telephony and How to Deal With It<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If SPAM arrives in your inbox at 4am, the chances are your antispam software will catch it. But even if it doesn&#8217;t, you won&#8217;t lose much sleep over its arrival. But it&#8217;ll be a different story with SPIT (spam over internet telephony). Junk phone calls at 4am are going to drive you mad because the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,9],"tags":[],"class_list":["post-467","post","type-post","status-publish","format-standard","hentry","category-hellraisin","category-mean-machines"],"_links":{"self":[{"href":"http:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts\/467","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=467"}],"version-history":[{"count":0,"href":"http:\/\/arxivblog.com\/index.php?rest_route=\/wp\/v2\/posts\/467\/revisions"}],"wp:attachment":[{"href":"http:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=467"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=467"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/arxivblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=467"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}