Hello, On 25 Sep 2007 16:33:32 -0000, John Levine <[EMAIL PROTECTED]> wrote: > > >1. The querier user types the target user's "human name" (as if he were > > consulting a phonebook), or a pseudoynm. > >2. The pairing request is forwarded to the target phone. > >3. The query, along with the querier user's name, are displayed on the > > target phone's screen. > > I have a list of 250,000 people here (scraped off web sites) to whom > I'd just love to make recorded phone calls. Can I use your protocol > to ask them all if it's OK? If not, why not, and how are you going to > stop me?
Using a Turing test (CAPTCHA) for example. http://en.wikipedia.org/wiki/Captcha When you make a request, the target phone returns a captcha. If you don't provide the right solution, the target user won't even see your request, it will be dropped. Captcha's difficulty can be adaptively tuned by the target phone.. So another step should be added to the above description. I hope this answers your question! Regards, pars Regards, > John Levine, [EMAIL PROTECTED], Primary Perpetrator of "The Internet for > Dummies", > Information Superhighwayman wanna-be, http://www.johnlevine.com, ex-Mayor > "More Wiener schnitzel, please", said Tom, revealingly. > >
_______________________________________________ Ietf mailing list [email protected] https://www1.ietf.org/mailman/listinfo/ietf
