[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #9385 [BridgeDB]: bridgedb's email responder should fuzzy match email addresses within time periods



#9385: bridgedb's email responder should fuzzy match email addresses within time
periods
-----------------------------------------+----------------------------------
 Reporter:  isis                         |          Owner:  isis
     Type:  defect                       |         Status:  new 
 Priority:  normal                       |      Milestone:      
Component:  BridgeDB                     |        Version:      
 Keywords:  email,distributor,spam,bots  |         Parent:      
   Points:                               |   Actualpoints:      
-----------------------------------------+----------------------------------

Comment(by sysrqb):

 Replying to [comment:1 phw]:
 > Interesting. Nice find, isis!

 Definitely!

 This will be (sadly) very difficult to fix, however. We do handle the '+'
 notation already:

 {{{
     idx = localpart.find('+')
     if idx >= 0:
         localpart = localpart[:idx]
     rules = domainrules.get(domain, [])
     if 'ignore_dots' in rules:
         # j.doe@ is the same as jdoe@.
         localpart = localpart.replace(".", "")

     return "%s@%s"%(localpart, domain)
 }}}

 So, limiting "incrementing" addresses and "similar" addresses is the next
 challenge. I fear it will be a losing battle.

 Replying to [comment:2 mparte]:
 > Could you test for Kolmogorov Complexity?
 Interesting thought, it's something we can look into and experiment with.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9385#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs