Author: M.Prince (18 Jan 05 4:14am)
We anticipate that, over time, harvesters like spam servers will move to using proxy servers in order to obscure their identities. When this happens -- and we've seen some indication that with at least a few harvesters it's happening already -- it will be harder to use harvester data in order to determine spammers identities. We're encouraged that so few harvesters today are using proxies to obscure their identities. We recognize that as soon as we start going after them, this is bound to change. However, the data from harvester traffic, even if through proxies, is still useful. For example, website administrators can choose to block the traffic generated from known proxies in order to decrease the risk to their sites.
While we don't know what conclusions the data will lead us to eventually, we do know that, to this point, no one was gathering information on the first stage of the spam cycle. Project Honey Pot has begun to gather that information and, as such, we hope will be useful to the overall spam fight.
|