This shows you the differences between two versions of the page.
Both sides previous revision Previous revision | |||
spamtrap [2014/07/15 10:34] ian |
spamtrap [2014/07/15 10:35] ian [Spamtrap] |
||
---|---|---|---|
Line 5: | Line 5: | ||
As the email address is not owned by an individual, any email sent to it can reasonably be considered to be spam. The systems monitoring the inbox could then apply a block (based on content matching, sending address, IP address, etc) affecting general delivery to other recipients using the anti-spam service. | As the email address is not owned by an individual, any email sent to it can reasonably be considered to be spam. The systems monitoring the inbox could then apply a block (based on content matching, sending address, IP address, etc) affecting general delivery to other recipients using the anti-spam service. | ||
- | In most cases, spamtraps are found is lists of dubious provenance (e.g. lists that are bought, rented, or shared) or where an organisation operates lax contact data and permission procedures. | + | In most cases, spamtraps are found in lists of dubious provenance (e.g. lists that are bought, rented, or shared) or where an organisation operates lax contact data and permission procedures. |
===== Identifying spamtraps ===== | ===== Identifying spamtraps ===== |