[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #9385 [BridgeDB]: bridgedb's email responder should fuzzy match email addresses within time periods
#9385: bridgedb's email responder should fuzzy match email addresses within time
periods
-----------------------------------------+----------------------------------
Reporter: isis | Owner: isis
Type: defect | Status: new
Priority: normal | Milestone:
Component: BridgeDB | Version:
Keywords: email,distributor,spam,bots | Parent:
Points: | Actualpoints:
-----------------------------------------+----------------------------------
Comment(by sysrqb):
Replying to [comment:1 phw]:
> Interesting. Nice find, isis!
Definitely!
This will be (sadly) very difficult to fix, however. We do handle the '+'
notation already:
{{{
idx = localpart.find('+')
if idx >= 0:
localpart = localpart[:idx]
rules = domainrules.get(domain, [])
if 'ignore_dots' in rules:
# j.doe@ is the same as jdoe@.
localpart = localpart.replace(".", "")
return "%s@%s"%(localpart, domain)
}}}
So, limiting "incrementing" addresses and "similar" addresses is the next
challenge. I fear it will be a losing battle.
Replying to [comment:2 mparte]:
> Could you test for Kolmogorov Complexity?
Interesting thought, it's something we can look into and experiment with.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/9385#comment:3>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs