This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
spamtrap [2014/07/15 10:34] Ian Pollard |
spamtrap [2014/12/20 11:42] (current) |
||
---|---|---|---|
Line 5: | Line 5: | ||
As the email address is not owned by an individual, any email sent to it can reasonably be considered to be spam. The systems monitoring the inbox could then apply a block (based on content matching, sending address, IP address, etc) affecting general delivery to other recipients using the anti-spam service. | As the email address is not owned by an individual, any email sent to it can reasonably be considered to be spam. The systems monitoring the inbox could then apply a block (based on content matching, sending address, IP address, etc) affecting general delivery to other recipients using the anti-spam service. | ||
- | In most cases, spamtraps are found is lists of dubious provenance (e.g. lists that are bought, rented, or shared) or where an organisation operates lax contact data and permission procedures. | + | In most cases, spamtraps are found in lists of dubious provenance (e.g. lists that are bought, rented, or shared) or where an organisation operates lax contact data and permission procedures. |
===== Identifying spamtraps ===== | ===== Identifying spamtraps ===== |