Spam: is everything created equally?

Even though email has been one of the most common routes of virus infection for the past 10 years, many people are still opening attachments from people they don’t know right now. Seconds later, a virus is installed and then the problem really begins.

If the infection that may come from some of these emails were to stop only on your computer, the overall damage would be minimal, but unfortunately many viruses are designed to spread across the Internet without any further action on your part and this can infect other computers. , which is a much bigger problem.

One of the most popular ways for ISPs or email service providers to block certain messages is to tell the email client which emails are spam and which are not. This is quite easy to do by clicking the “this is spam (or spam)” button in your email client.

While this makes it easier for you to inform your ISP or ESP that an email is spam, this method also has some drawbacks. For example, many people use this method to try to unsubscribe from lists they previously subscribed to. By tagging these emails as spam, you are unfairly labeling the sender as a spammer, which is inaccurate since they signed up to receive the emails to begin with.

It is easy to identify around 80% of the emails that reach our email boxes. We can easily identify which are SPAM and which are real. The problem is deciding on the remaining 20% ​​of the emails. If these emails are wanted or if they represent spam, it is a much more difficult proposition. You may not want a particular email message, but that hardly makes it spam. You may not want to receive political cartoons from your uncle, but receiving them is hardly spam, and reporting these emails as spam would be unfair.

You can use something called “authentication”, which is really nothing more than having someone label the message as if it were from a trusted or desired source. If you know that the source will not spam you, you are much more likely to open the email you receive and therefore much less likely to get a virus or other infection. One authentication method you may have seen is “Sender ID”. This requires each email to have a sender ID attached so that you immediately know whether an email is from a trusted source or not.

Email postage is another authentication method. You have probably responded to these emails in the past when you signed up for an email list or to receive emails from a particular website; Once you do, you will immediately receive an email asking you to confirm before they put you on their email list. This allows you to confirm that you requested an email from the site and that you will love and appreciate the email you receive.

Some researchers have estimated that up to 70% of the emails we receive are spam, while others argue that it is less than 50%. Regardless of the percentage, the reality is that most of us receive a number of emails every day that we do not want, that are not desirable for us and that in some cases can be dangerous. Whichever method ends up being used most successfully in the future, hopefully it will decrease these spam emails.

Author: admin

Leave a Reply

Your email address will not be published. Required fields are marked *