IDG News Service - Craigslist often relies on very simple mechanisms and the kindness of honest users to combat fraud on its pages, the site's founder said on Wednesday.
"Our first line of defense against the bad guys is the flag for removal," said Craig Newmark, founder of Craigslist, speaking at the Authentication and Online Trust Summit in Seattle. "If you see an ad on the site which is wrong for whatever reason, you can flag it, and if others agree with you, then the ad is removed automatically."
Craigslist's best defense against users trying to buy things with bad checks is the simple warning against accepting cashier's checks that it displays on the site, he said. "We get regular feedback that people see those warnings," he said. "Some people don't read them, and they will get scammed, and our heart goes out to them, but I don't know what else to do. We do ask for suggestions."
Newmark employs another even simpler method for combating fraud, which essentially amounts to shaming the offenders. When in New York, he'll often visit apartment brokerages that he knows have "been too predatory for too long," he said. "I like dropping in unannounced. I'm typically met with disbelief, then panic, then photography."
Craigslist sites also have discussion boards where users can talk about issues that they have on the sites or techniques for avoiding fraud. People help each other out there, Newmark said. "People give other people a break ... It's not a matter of technology, it's that simple," he said.
Still, Craigslist does employ a number of more sophisticated tools to guard against fraudulent activity. Recently the site implemented a new Captcha system. "It's an ongoing fight, but I'm hoping we can increase the pain of spamming our site to the point where the cost exceeds the value to the spammer," he said. Captcha asks users to type in characters that they see on the screen, a technique that can prevent some automated spam mechanisms.
For the future, Newmark has high hopes for authentication technologies like digital certificates to combat fraud, but he's been impatiently waiting for that technology for more than 10 years, he said.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Accelerating Network Convergence in Virtualized and Cloud Data Centers Adopting a converged networking strategy enables organizations to traffic server and storage I/O workloads on consolidated data throughput channels. Intelligent software helps optimize...
- How 10GbE Network is the Backbone of the Virtual Data Center The shift to a virtual data center has put tremendous strain on legacy networks; driving the need for more speed, lower latency, more...
- Live Webcast Best Practices for the Hyperconverged Enterprise Network To the Age of Constant Connectivity and Information overload
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Networking White Papers | Webcasts