[195058] in North American Network Operators' Group
Re: Vendors spamming NANOG attendees
daemon@ATHENA.MIT.EDU (tim@pelican.org)
Tue Jun 20 09:37:13 2017
X-Original-To: nanog@nanog.org
Date: Tue, 20 Jun 2017 14:37:09 +0100 (BST)
From: "tim@pelican.org" <tim@pelican.org>
To: "NANOG" <nanog@nanog.org>
In-Reply-To: <CY1PR13MB06456B0AB3B36BE49BD2C2C2E4C30@CY1PR13MB0645.namprd13.prod.outlook.c
om>
Errors-To: nanog-bounces@nanog.org
On Tuesday, 20 June, 2017 14:26, "Rod Beck" <rod.beck@unitedcablecompany.co=
m> said:=0A=0A> And how do you tell if an address was scraped or not? There=
are databases and=0A> zillions of other ways of gaining addresses.=0A> =0A=
> =0A> I doubt you can distinguish the source with any real reliability.=0A=
=0ADepending on whether you're registered with personal or corporate email,=
and how much control you have over the platform in question, you can disti=
nguish the source with fairly high reliability. Just generate a new 'bob+n=
anog70@bobsdomain.org' style address for every event you register for, ever=
y website that requires a contact address, every mailing list, ...=0A=0AIf =
you're concerned that people will twig, and use the naked 'bob@' address, y=
ou could work with multiple names including a hash that look like internal =
nonsense, e.g. 'bob34adf@', or block the un-plussed 'bob@' entirely and use=
e.g. 'robert@' for people you trust to have your real, non-circumstance-sp=
ecific email address.=0A=0AI know people who do this, it really depends how=
much you care about being able to trace and block people who are either sc=
raping or re-selling your details.=0A=0ARegards,=0ATim.=0A