FM spam: soon the posters will “grow wiser” and start broadcasting the FM signal, scoring our favorite radio station

FM spam: soon the posters will “grow wiser” and start broadcasting the FM signal, scoring our favorite radio stationLast year, a very interesting presentation was presented at the conference “USENIX Symposium on Networked Systems Design and Implementation”. How to turn a T-shirt or billboard into an FM radio station. The presentation author explains how to “fit” digital data and arbitrary audio tracks onto an FM signal already flying over the air. Through the effect of backscattering radio waves. The presentation seemed so interesting to me that I could not refrain from preparing a brief retelling.
 
What is the practical value of such "FM-jerking"? Are they generally real, or is it from science fiction? And ...
+ 0 -

Soon half of the calls will be from robots. Advice: do not answer (?)

Soon half of the calls will be from robots. Advice: do not answer (?) 3r-33199. 3r3-31. Today we have an unusual material - this is a translation of an article about illegal automatic dialing in the USA. For centuries, there have been people who used technology not for good, but to fraudulently cash in on gullible citizens. Modern telecommunications are no exception, spam or outright "divorces" can overtake us by SMS, by mail, by phone. With phones it has become even more fun, because today there are automatic calls (hereinafter - robozvonki). Invented as a legitimate and transparent way to inform people and make additional sales, they are very fond of scammers; ...
+ 0 -

How to make email-lists and do not mow: practical advice

How to make email-lists and do not mow: practical advice

 
The developer, who first encountered the generation of e-mails, has almost no chance to write an application that will do it correctly. About 40% of emails generated by enterprise applications have some kind of violation of standards, and as a result, problems with delivery and display. There are reasons for this: e-mail is technically much more complicated than the web, mail work is regulated by several hundred standards and an uncountable number of common (and not so) practices, and email clients are diverse and unpredictable. Testing can significantly improve the situation, but there are practically ...
+ 0 -

Naive Bayes, or how mathematics allows you to filter spam

Hello! In this article I will talk about how the spam of the letter is being filtered in almost all popular mail services. Let's go through the theory, then consolidate the practice, well, in the end I will provide my sketch of the code in my adored language R. I will try to present as lightly as possible expressions and formulations. Let's get started!
 
 
Naive Bayes, or how mathematics allows you to filter spam
 
Very good article about the naive Bayesian classifier
 
I drew knowledge from the Wiki: ...
+ 0 -

HOWTO setup ubuntu ??? sendmail + DKIM + SFP + DMARC or how I managed to get into the bastion of gmail

Foreword


 
On my server there is an online lighting store sevenlight.ru and an online store for building materials st-goods.ru Before the history with locks of Roskomnadzor we collected traffic about 2000 visits per day, and the mail server sent out about 200 letters per day to all popular mail services , incl. Google and Yandex. Everything was great. But as they say in the well-known clip: "Everything was so good until Roskomnadzor came!" Now, when we managed to find a host whose IP addresses do not fall under the blocking of state censorship, another problem arose.
 
 
I recently discovered ...[/h]
+ 0 -

Symbolic vulnerability: as a simple message results in errors in the phone

Symbolic vulnerability: as a simple message results in errors in the phone
 
Shot from the film "The Matrix" (1999)
 
 
Against the background of the capabilities of modern smartphones, it's easy to forget that mobile communication is a very old technology. The only concept of sending short text messages is was developed. more than 30 years ago. If people started creating SMS in 201? then probably would not limit one message to 160 characters (in 7-bit encoding).
 
 
Communication inherits not only the constraints inherent in the creation. Many errors, hidden and obvious, are waiting for their time for years, beginning with a distant mobile past. Over time, new hardware ...
+ 0 -

How users teach Yandex to warn about telephone spam

All those who have flashed their number on the Internet, filled in a questionable questionnaire in offline or who simply were not lucky to get into numerous bases are familiar with the telephone spam. Today we will tell the readers of Habrahabra about how, through user feedback and machine learning, we taught the Yandex application to warn about unwanted calls.
 
 
How users teach Yandex to warn about telephone spam
 
 
Calls from unfamiliar numbers are always a difficult choice. Is this a long-awaited courier or another operator calling with a "unique" promotional offer? To solve this problem, there are mobile applications that work on the basis of directories ...
+ 0 -

DNSCrypt 2.0 and ad blocking

In this article I would like to consider the innovations of Dnscrypt, on a concrete example, which is sure to be useful for someone.
 
 
For those who do not know, Dnscrypt is a unique protocol for encrypting DNS traffic. It makes it possible to protect DNS communications from interception and spoofing, and, for example, bypass blocking implemented at the level of DNS queries.
 
 
Of the main features of the new version, first of all, I want to note the possibility of communication with the server via the TCP protocol, which makes this channel more stable and less noticeable.
 
 
In this article...
+ 0 -

Conference DEFCON 17. "Steal profits from spammers: how I stopped worrying about spam and fell in love with it." Grant Jordan

Before I tell you about our project, I want to tell you who I am, Grant Jordan, and who is Kyle Vogt, who works for Justin.tv. We are students of the Massachusetts Institute of Technology, who have a lot of free time. And we have a lot of interesting projects, such as a device for hacking safes, which allows you to open safes with the highest degree of protection. However, to understand why we deal with spam, the answer to the question: who are we not?
 
 
We are not experts in the exchange market, spammers or people who suddenly became rich by playing on the stock exchange. Therefore, all I will ...
+ 0 -

Find it if you can. How to select messages in the general stream

Each of us is familiar with the problem of a huge mass of alerts from shops, banks, car dealers and other organizations that are constantly falling on all electronic and not very electronic channels. We used to call it spam, developed reflexes of lightning-speed removal, set up spam filters, or just do not notice such messages. And we reconciled ourselves to the fact that it is practically impossible to find useful messages among them.
 
 
Find it if you can. How to select messages in the general stream
 
 
Is it possible to make electronic channels more efficient, somehow help recipients to find the right letters? The matter is complicated by the fact that while artificial ...
+ 0 -