Sunday, May 16, 2021

Blue Security’s Do Not Intrude Registry

Spam seems to have no bounds.

Most people set up some type of filter to weed out the bad email from the good. That approach, has its limitations. For example, each installation requires ongoing maintenance, like keeping blacklists current, in order to operate effectively. False positives can keep legitimate messages from reaching their intended recipients.

Blue Security has created a “Do Not Intrude Registry” system and an active community of adamant users that aim to change the spam economy. They’re creating strong incentives for spammer compliance.

The concept was patterned after the US government created “Do Not Call List” for telemarketers. It was inspired by the belief that Internet users have the right to firmly demand that they stop receiving spam. Blue Security thinks that choosing not to receive spam should be respected by all email senders.

Although a government effort was launched in 2003 for a similar spam registry, the idea was abandoned because it would be difficult to enforce.

Today Blue Security’s “Do Not Intrude Registry” is enforced by the user community and its own Blue Security technology.

So enough about inspiration, let’s see how it works.

This article was first published on LinuxPlanet.com.

Similar articles

Latest Articles

How IBM has Changed...

Think is IBM’s big annual conference, and again this year, it was digital. I’m noticing a sharp quality difference in shows like this where...

Database-Tuning Platform Launches and...

PITTSBURGH — A team out of Carnegie Mellon University is launching its automatic database-tuning product today with the help of $2.5 million in funding.   OtterTune,...

Top 10 Professional Services...

Professional services automation (PSA) software aims to offer service-based companies most of the software they will need to run their businesses in one package....

What is Data Aggregation?

Data aggregation is the process where raw data is gathered and presented in a summarized format for statistical analysis. The data may be gathered...