1996-09-10 - Re: Court challenge to AOL junk-mail blocks

Header Data

From: Will Rodger <rodger@interramp.com>
To: NetSurfer <cypherpunks@toad.com
Message Hash: 10ba0c043aa14678a556bb0d5748f64dd5ecd64d9620aec2d45c6f890af6ffce
Message ID: <1.5.4.32.19960909182501.00685618@pop3.interramp.com>
Reply To: N/A
UTC Datetime: 1996-09-10 01:36:53 UTC
Raw Date: Tue, 10 Sep 1996 09:36:53 +0800

Raw message

From: Will Rodger <rodger@interramp.com>
Date: Tue, 10 Sep 1996 09:36:53 +0800
To: NetSurfer <cypherpunks@toad.com
Subject: Re: Court challenge to AOL junk-mail blocks
Message-ID: <1.5.4.32.19960909182501.00685618@pop3.interramp.com>
MIME-Version: 1.0
Content-Type: text/plain


-----BEGIN PGP SIGNED MESSAGE-----



>If you know a valid email address on the spammers system you can always 
>bounce each message back to them.  If enough people turned the messages 
>back on them it might give them the opportunity to experience first hand 
>what its like to receive tons of mail you don't want or need...
>

Ah, but they never do.

Why not? Because spammers _invariably_  forge the return addresses to keep
exactly that from happening. Indeed, Cyber Promo claims it "had an
understanding" with AOL that it could use AOL boxes  or bogus adresses to
keep bounced messages from coming back at them and crashing their server.
Deliberatlely forging addresses, Cyber claims, is entirely legal. AOL says
it's fraud.

Interesting footnote: AOL, of course, is able to trace a lot of the spam it
gets. It has sent back thousands of messages at once to Cyber which, in
turn, has gotten it bumped from several ISPs once their servers crashed as a
result.

Tough business, huh?

Will Rodger
Washington Bureau Chief
Inter@ctive Week
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQCVAwUBMjSGvTqp6Cc7rRIJAQHCEQP/fZwhp/GTSwj9Emusgh9QFnAlafpOL2qI
ces6RqwSoZfmbAmhREh836sakjS2d+mHdYK84FH7WdXWnuzMlDAPCls7OO8AU4t8
oMN7koLM3cpgwlavt/Lw8NJp3wC5OnRnrqNeunkBvNEBs8aaJ+C6isH/zrErgbt5
0QL9cYlEyq8=
=EW/y
-----END PGP SIGNATURE-----






Thread