Kittens could sink their wee teeth into spam deluge
IDG News Service - An executive at Microsoft Corp. has an unusual idea for beating spammers. Powerful software tools and supercomputers aren't involved, but kittens are.
Or rather, photos of kittens. Kevin Larson, a researcher at Microsoft's advanced reading technologies group, has found that asking a user to identify the subject of a photo, like a kitten, could help block spam programs.
Currently, services like Microsoft's free e-mail service Hotmail require new users to type in a string of distorted letters as proof that it's a human signing up for the account and not a computer. Called Human Interactive Proofs (HIPs), Microsoft, Ticketmaster and a host of other companies have been using the system for around five years, Larson said. He spoke in Seattle on Friday at TypeCon 2007, an annual conference put on by the Society of Typographic Aficionados for type enthusiasts and designers.
When Hotmail first started using HIPs, the number of e-mail accounts generated on the first day dropped by 20% without an increase in support queries, Larson said. That was a sign that the HIPs were fooling the computer programs that spammers use to automate signing up for new Hotmail accounts from which spam is sent. However, spammers learned how to tweak their programs to better recognize the HIPs, he said.
Now, it's a race for Microsoft to continue to alter its HIP system to fool the computers, which ultimately seem to catch on. Larson's group at Microsoft experiments with different ways to distort the text used in HIPs in a way that is easy for humans to read but difficult for computers.
One twist on the HIP idea that they've worked on is to display 16 or more photos and ask for identification of the photos. In an example, he suggested using pictures of cats and dogs. The problem with the concept, however, is that Microsoft would have to create a massive catalog of photos, otherwise the programmers could match the correct response with each photo in the catalog and begin to spoof the system, he said.
Microsoft Research is offering a beta service of a photo recognition technology for free to Web site hosters. The service, called Asirra, receives animal photos from Petfinder.com and in exchange includes an "adopt me" button that takes visitors to a page where they can consider adopting the animal.
The Asirra project was "inspired," according to its Web page, by HotCaptcha, a similar idea that asks users to identify the attractive people in a group of photos. (Captcha stands for "Completely Automated Public Turing test to tell Computers and Humans Apart." The term is trademarked by Carnegie Mellon University.) Asirra developers found that idea potentially offensive and subjective, so they tweaked it to use animal photos instead.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts