Kittens could sink their wee teeth into spam deluge
IDG News Service - An executive at Microsoft Corp. has an unusual idea for beating spammers. Powerful software tools and supercomputers aren't involved, but kittens are.
Or rather, photos of kittens. Kevin Larson, a researcher at Microsoft's advanced reading technologies group, has found that asking a user to identify the subject of a photo, like a kitten, could help block spam programs.
Currently, services like Microsoft's free e-mail service Hotmail require new users to type in a string of distorted letters as proof that it's a human signing up for the account and not a computer. Called Human Interactive Proofs (HIPs), Microsoft, Ticketmaster and a host of other companies have been using the system for around five years, Larson said. He spoke in Seattle on Friday at TypeCon 2007, an annual conference put on by the Society of Typographic Aficionados for type enthusiasts and designers.
When Hotmail first started using HIPs, the number of e-mail accounts generated on the first day dropped by 20% without an increase in support queries, Larson said. That was a sign that the HIPs were fooling the computer programs that spammers use to automate signing up for new Hotmail accounts from which spam is sent. However, spammers learned how to tweak their programs to better recognize the HIPs, he said.
Now, it's a race for Microsoft to continue to alter its HIP system to fool the computers, which ultimately seem to catch on. Larson's group at Microsoft experiments with different ways to distort the text used in HIPs in a way that is easy for humans to read but difficult for computers.
One twist on the HIP idea that they've worked on is to display 16 or more photos and ask for identification of the photos. In an example, he suggested using pictures of cats and dogs. The problem with the concept, however, is that Microsoft would have to create a massive catalog of photos, otherwise the programmers could match the correct response with each photo in the catalog and begin to spoof the system, he said.
Microsoft Research is offering a beta service of a photo recognition technology for free to Web site hosters. The service, called Asirra, receives animal photos from Petfinder.com and in exchange includes an "adopt me" button that takes visitors to a page where they can consider adopting the animal.
The Asirra project was "inspired," according to its Web page, by HotCaptcha, a similar idea that asks users to identify the attractive people in a group of photos. (Captcha stands for "Completely Automated Public Turing test to tell Computers and Humans Apart." The term is trademarked by Carnegie Mellon University.) Asirra developers found that idea potentially offensive and subjective, so they tweaked it to use animal photos instead.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts