On Thursday, December 9, 2004, 8:28:47 PM, Loren Wilton wrote:
>> These are the recent trends raised by my management:
>>
>> Hash Busting - slightly modify each copy of message to foil
>> 'fingerprinting' techniques

> Since SA doesn't do fingerprinting this doesn't have quite the desired
> effect.
> It can break a meta rule looking for particular text, but the quick answer
> is generally to modify the meta with a new term or two.  After about three
> tries you end up with a rule that will catch most all the variations.
> And in any case Bayes doesn't care much about minor variations, its all spam
> to it.


>> Bayes Poisoning - addition of random dictionary words

> Makes really GOOD spam identification.  I hardly ever send or receive email
> containing a page of Cicero in the original Latin.  Spammers do.

> In addition, most of these things are mispunctuated and often have other
> interesting characteristics that make them fodder for some pretty generic
> rules.  I have mine scored at 10 points each.  It isn't  unusual to manage
> to hit 80 points with one of these things.


>> Hidden Text - using invisible text in html messages

> Makes really GOOD spam identification.    :-)


>> Keyword Corruption - using obfuscated text to hide keywords

> Makes really GOOD spam identification.


>> Tiny Messages - messages with only URL or image

> These are harder.  Fortunately they almost always follow one of a handful of
> standard pattersn that make them amenable to catching with fairly simple
> rules.

And the key point is that if commercial anti-spam vendors
are using points such as these to either differentiate
themselves from other commercial efforts or SpamAssassin,
they're either:

A) Using SpamAssassin underneath
B) Inferior to SpamAssassin
C) Equivalent functionally to SpamAssassin

Jeff C.
-- 
Jeff Chan
mailto:[EMAIL PROTECTED]
http://www.surbl.org/

Reply via email to