Hello,

On 25 Sep 2007 16:33:32 -0000, John Levine <[EMAIL PROTECTED]> wrote:
>
> >1. The querier user types the target user's "human name" (as if he were
> >   consulting a phonebook), or a pseudoynm.
> >2. The pairing request is forwarded to the target phone.
> >3. The query, along with the querier user's name, are displayed on the
> >   target phone's screen.
>
> I have a list of 250,000 people here (scraped off web sites) to whom
> I'd just love to make recorded phone calls.  Can I use your protocol
> to ask them all if it's OK?  If not, why not, and how are you going to
> stop me?


Using a Turing test (CAPTCHA) for example.

http://en.wikipedia.org/wiki/Captcha

When you make a request, the target phone returns a captcha. If you
don't provide the right solution, the target user won't even see your
request, it will be dropped. Captcha's difficulty can be adaptively
tuned by the target phone..

So another step should be added to the above description.

I hope this answers your question!

Regards,
pars



Regards,
> John Levine, [EMAIL PROTECTED], Primary Perpetrator of "The Internet for
> Dummies",
> Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor
> "More Wiener schnitzel, please", said Tom, revealingly.
>
>
_______________________________________________
Ietf mailing list
[email protected]
https://www1.ietf.org/mailman/listinfo/ietf

Reply via email to