Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Collateral Damage

Type
Video
Tags
spam, virus
Authors
Peter Eisentraut
Event
Chaos Communication Congress 22th (22C3) 2005
Indexed on
Mar 27, 2013
URL
http://dewy.fem.tu-ilmenau.de/CCC/22C3/video/22C3-505-en-collateral_damage.mp4
File name
22C3-505-en-collateral_damage.mp4
File size
399.0 MB
MD5
edd4cab3f52d1040b379c5f2daae3f47
SHA1
2aed4000afaea1980a2b7c11b5536a0e53cd766b

This lecture takes a critical look at the impact that contemporary spam and virus filter techniques have on the stability, performance, and usability of the e-mail system. Spam and virus filtering techniques have been discussed numerous times at this congress and other ones. What is rarely considered are the consequences that these measures have for the overall stability, performance, and usability of the e-mail system. Many spam filtering techniques play tricks with the e-mail protocols, which carries the risk of shutting out systems that use stricter or alternative implementations of these protocols. Filter systems that create bounce messages have become a plague of their own on the Internet. Alternatively, filter systems discard messages without notification, with the result that there is currently no longer a guarantee that any message will arrive anywhere. Large ISPs are regularly listed on DNS block lists, and many users are indiscriminate in their application of these lists, creating more communication barriers. New purported sender idenfication techniques such as SPF do nothing to fight spam but instead discriminate users of certain ISPs and lock in users to their e-mail service providers. Besides these technical issues, spam filtering when applied without careful consideration also creates privacy and legal problems. Massive gathering and analysis of e-mail traffic cannot only be used to fight spam but also to harvest information about e-mail users. Many providers and administrators may not even be aware that most of their e-mail filtering activities are likely to toe the line to illegality. This lecture will take a critical look at these issues, looking at examples, experiences, and current developments in the fight against e-mail abuse, with the goal of raising awareness among users and administrators.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !