Fighting Spam: The Science
Consider the following simple approach to fighting spam :
If I don’t know you, and you want your e-mail to appear in my inbox, then you must attach to your message an easily verified “proof of computational effort”, just for me and just for this message.
KeywordsPrice Function Processor Speed Architecture Community Hard Function Rigorous Investigation
- 2.Back, A.: Hashcash - A Denial of Servic Counter-Measure, http://www.cypherspace.org/hashcash/hashcash.pdf
- 4.Chang, R.: Could spam kill off e-mail? PC World (October 23, 2003), See, http://www.nwfusion.com/news/2003/1023couldspam.html
- 5.Dwork, C., Naor, M.: Pricing via Processing, Or, Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)Google Scholar
- 6.Spam Filter Review, Spam Statistics (2004), http://www.spamfilterreview.com/spam-statistics.html