Re: IETF solution for pairing cellular hosts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello,

On 25 Sep 2007 16:33:32 -0000, John Levine <johnl@xxxxxxxx> wrote:
>1. The querier user types the target user's "human name" (as if he were
>   consulting a phonebook), or a pseudoynm.
>2. The pairing request is forwarded to the target phone.
>3. The query, along with the querier user's name, are displayed on the
>   target phone's screen.

I have a list of 250,000 people here (scraped off web sites) to whom
I'd just love to make recorded phone calls.  Can I use your protocol
to ask them all if it's OK?  If not, why not, and how are you going to
stop me?

Using a Turing test (CAPTCHA) for example.

http://en.wikipedia.org/wiki/Captcha

When you make a request, the target phone returns a captcha. If you
don't provide the right solution, the target user won't even see your
request, it will be dropped. Captcha's difficulty can be adaptively
tuned by the target phone..

So another step should be added to the above description.

I hope this answers your question!

Regards,
pars



Regards,
John Levine, johnl@xxxxxxxx, Primary Perpetrator of "The Internet for Dummies",
Information Superhighwayman wanna-be, http://www.johnlevine.com , ex-Mayor
"More Wiener schnitzel, please", said Tom, revealingly.


_______________________________________________

Ietf@xxxxxxxx
https://www1.ietf.org/mailman/listinfo/ietf

[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]