7/26/2023 0 Comments Transat hesperides ibiza![]() ![]() The Garden of the Hesperides is Hera's orchard in the west, where either a single apple tree or a grove grows, producing golden applesthat grant immortality when eaten. The location of the Garden of Hera and the Hesperides could of course not be a total secret for the major gods obviously visited to deposit and remove the hidden articles there and there are several myths about unexpected visitors to the Garden of Hera. Must identify a useability limit and upper bound on how long a user is willing to wait before getting an email address.Plural for Hesperis and represents the multiple nymphs of the garden of Hera Garden of the Hesperides, Melbourne, Victoria, Australia. Users with specific aim of getting an email address and general browsers have different aims.What is the aim of the user when browsing the site? In a discussion with Jon Oberlander today after lectures he suggested:ġ. Their user experience expectations will adjust according to their desired goals. when viewing an academics homepage, most users would be interested in finding out what research areas are, what papers are etc., not in trying to achieve commuinication with the page owner. As such, a browser will probably tolerate, not be bothered about any delays. Explaining why and how long user must wait for information may increase their tolerance for waiting.However, when a user has specific intention to get email address(or contact site owner), they will want get information fast. Incorporating something like "this is an anti-spam measure. Google keywords: latencies, user tolerance.Although may not have publish figures, may hint to sources of primary research that's uncited! Imperical research: how long is a user willing to wait before their expectations are frustated: it will take XXX seconds for the email address to appear" this into the design may increase useability.Ģ. Project Musings: Honeypot Started reading Honeypots by Lance Spitzner (Addison-Wesley, 2003) to gather ideas on how to improve on the existing spam honeypot. JavaScript must have these characteristics to deter the attacker Whilst may not be able to know these bounds, as we do not know attackers modus operandi, an estimated bounds maybe useful in identifying a suitable NP complete problem.Must identify way to set/measure reasonable bounds on these?.Can limit attacker machine’s – CPU, Memory or Bandwidth.Mine Sweeper is NP complete (wikipedia).Establishing Upper Resource Bounds on Spammer’s machine #Email obfuscator tool how to Problem must be NP complete – must be no shortcuts to solving the problem i.e.The source code function must be such that.Īttacker must successfully complete execution before they can derive result.# JavaScript Idea (Email address stored in an incomplete private-key) # Encrypt email address using trapdoor function/public-key algorithm. ![]() Use certain bits in private-key to generate a minesweeper grid.Human user must play the minesweeper game and discover where all the mines are to recover the full private key to de-crypt the email address.# with this method, we may not need code obfuscation, although code obfuscation may make it harder for attacker to understand the underlying algorithm # Obfuscation may be important to prevent automated processing of the script. If attacker does not know how JavaScript runs cannot run it, must require human user to run code. user must interact (and win minesweeper) to gain private key.īecomes a new form of captcha (reverse turing test) Cons of this approach:.Client-side code cannot be relied to set up minesweeper grid.Must random minesweeper grids, therefore server side code is requiredīut it maybe a fun way to demonstrate how it works! Hiding your email address in games.It maybe simple for you to solve the puzzle, but not for a computer. Disability factor can be addressed by a guest book form input function. Unsolicited email, spam, is a well known issue facing internet users. Currently popular methods are typically based around identifying and filtering out spam. Such reactionary solutions that can only deal with spam after an unwanted message is sent out onto the network are at best sub-optimal. ![]() ![]() They do not prevent spam from consuming network bandwidth.īefore a spam message can be sent out onto the network, a spammer must first gain hold of a valid destination email address. ![]()
0 Comments
Leave a Reply. |