Yorkshire Dave writes:
>I don't know if I should be adding these incomplete ciphers to
>detoken.pl, they're useful to a lot of people before they're complete.
>Any opinions?
I'd say so -- you could leave the unknowns as ".", and count the dots once
the RE is generated; if there's too many (ie. 3
On Sat, 2003-09-06 at 21:03, Theo Van Dinter wrote:
> On Wed, Aug 27, 2003 at 01:29:52AM +0100, Yorkshire Dave wrote:
> > > 0=
>
> 0=Q
A quick roundup. Can anyone fill any gaps?
2queers cipher
--
in html comment
plain = abcdefghijklmnopqrstuvwxyz0123456789-_.@
coded = dO,9F_ [EMAIL
On Wed, Aug 27, 2003 at 01:29:52AM +0100, Yorkshire Dave wrote:
> > 0=
0=Q
--
Randomly Generated Tagline:
It's not easy to juggle a pregnant wife and a troubled child, but
somehow I managed to squeeze in 8 hours of TV a day.
-- Homer Simpson
Lisa's First Wor
Hello,
I found a new set of listwashing tokens, all are located inside HTML
comments.
I created the following transform matrix:
Left side is what the letter should be, the right side is the transformed
text.
An example looks like:
Message sent to [EMAIL PROTECTED]
would look like:
a=d
b=O
c=,
d
On Mon, 2003-08-18 at 20:02, Justin Mason wrote:
> Yorkshire Dave writes:
> > As long as it's worth blocking on it, I'll keep working at ciphers. If
> > all the spammers start using real encryption I'll look for another way.
> > I'm just taking advantage of a stupid subset of spammers while I can.
On Tue, 2003-08-19 at 05:16, Daniel Quinlan wrote:
> Brian White <[EMAIL PROTECTED]> writes:
>
> > Wouldn't the Bayes tests be just the thing for these since it's already
> > adaptive?
>
> Yes, but there's a difference between one good token and a surefire rule
> that catches a significant amount
Brian White <[EMAIL PROTECTED]> writes:
> Wouldn't the Bayes tests be just the thing for these since it's already
> adaptive?
Yes, but there's a difference between one good token and a surefire rule
that catches a significant amount of spam.
> What I can see happening, though, is spammers start
Yorkshire Dave writes:
> As long as it's worth blocking on it, I'll keep working at ciphers. If
> all the spammers start using real encryption I'll look for another way.
> I'm just taking advantage of a stupid subset of spammers while I can.
Yep. Bear in mind, there's a pretty large subset there
On Mon, 2003-08-18 at 20:03, Kai MacTane wrote:
> At 8/18/03 09:35 AM , Yorkshire Dave wrote:
>
> >I've had people sending me listwashing tokens for
> >months, and to date I've only seen 2 which I couldn't get anywhere with.
> >I suspect blowfish or similar is beyond the ability of some of them,
>
At 8/18/03 09:35 AM , Yorkshire Dave wrote:
I've had people sending me listwashing tokens for
months, and to date I've only seen 2 which I couldn't get anywhere with.
I suspect blowfish or similar is beyond the ability of some of them,
they can't use what they can't understand, which is why we're
On Mon, 2003-08-18 at 14:38, Brian White wrote:
> > > If anyone's interested, my part-complete document on listwashing tokens
> > > is at http://www.wot.no-ip.com/show.me/Projects/Listwashing_Tokens/ and
> > > the rule generator itself is http://www.wot.no-ip.com/cgi-bin/detoken.pl
> >
> > Excell
> > If anyone's interested, my part-complete document on listwashing tokens
> > is at http://www.wot.no-ip.com/show.me/Projects/Listwashing_Tokens/ and
> > the rule generator itself is http://www.wot.no-ip.com/cgi-bin/detoken.pl
>
> Excellent analysis! Also we're pretty sure figuring out some wa
YD> if I really wanted it I would
YD> just subscribe abcdefghijklmnopqrstuvwxyz@ and have the spammer supply
YD> me with a free key in every message but I don't think that's quite fair
YD> play.
You are worried about "fair play" with spammers
The real irony is that you are worried about "fair
On Fri, 2003-08-15 at 20:03, Justin Mason wrote:
> Henry Stern writes:
> > > Yorkshire Dave writes:
> > > > My original intention was to write an eval to run through the range of
> > > > caesar ciphers and import a list of substitution cipher codes, but it's
> > > > too slow (probably because I wri
> Yorkshire Dave writes:
> > My original intention was to write an eval to run through the range of
> > caesar ciphers and import a list of substitution cipher codes, but it's
> > too slow (probably because I write very poor perl), so here's the next
> > best thing.
> >
> > I've thrown together a l
> -Original Message-
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
> Sent: August 15, 2003 4:04 PM
> To: Henry Stern
> Cc: 'Justin Mason'; 'Yorkshire Dave'; 'spamassassin list'; 'devel list'
> Subject: Re: [SAdev] Re: [S
Henry Stern writes:
> > Yorkshire Dave writes:
> > > My original intention was to write an eval to run through the range of
> > > caesar ciphers and import a list of substitution cipher codes, but it's
> > > too slow (probably because I write very poor perl), so here's the next
> > > best thing.
>
17 matches
Mail list logo