Risk
5/29/2008
08:12 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Die, Comment Spam. Die

Blogging software and services provider Six Apart (known for MovableType and TypePad) has unleashed a new anti-comment spam filter, creatively dubbed TypePad AntiSpam. Now how will I get the latest stock-trading tips, body-enhancing drugs, and pharma deals?

Blogging software and services provider Six Apart (known for MovableType and TypePad) has unleashed a new anti-comment spam filter, creatively dubbed TypePad AntiSpam. Now how will I get the latest stock-trading tips, body-enhancing drugs, and pharma deals?The shocking news about TypePad AntiSpam is its price.

TypePad AntiSpam is being billed as a free, open source anti-comment spam filter. It's already built into TypePad blogs (has been for more than a year now) and can be installed as a plug-in for MovableType and WordPress platforms.

Much like conventional heuristic e-mail anti-spam filters, TypePad AntiSpam's engine gets smarter the more it's used and the more comments it evaluates.

I'm not sure how Six Apart is going to monetize this, or even if it has to. Here's what Anil Dash said on the Six Apart blog post:

The more different implementations of spam-fighting technology that exist, the more complex and challenging (and expensive!) it becomes for spammers to keep attacking our communities. At the same time, we want to make sure our economic incentives at Six Apart as a business are aligned with the best interests of bloggers, so that we feel the pain and cost of spam just as you do.

Maybe Six Apart is doing this to be a good netizen. But it also may siphon cash flow from its competitor, Automattic. Automattic charges $50 a month for the "enterprise keys" to its Akismet anti-comment spam filter, and $5 a month to anyone making "mad paper" from their blog. (As defined by Automattic, "mad paper" is income of more than $500 a month.)

If Akismet proves to be a "much" better filter, it won't have much to worry about. But if TypePad's engine comes anywhere near as effective, Akismet will also be very free, very soon.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7421
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a module name in the salg_name field, a different vulnerability than CVE-2014-9644.

CVE-2014-8160
Published: 2015-03-02
net/netfilter/nf_conntrack_proto_generic.c in the Linux kernel before 3.18 generates incorrect conntrack entries during handling of certain iptables rule sets for the SCTP, DCCP, GRE, and UDP-Lite protocols, which allows remote attackers to bypass intended access restrictions via packets with disall...

CVE-2014-9644
Published: 2015-03-02
The Crypto API in the Linux kernel before 3.18.5 allows local users to load arbitrary kernel modules via a bind system call for an AF_ALG socket with a parenthesized module template expression in the salg_name field, as demonstrated by the vfat(aes) expression, a different vulnerability than CVE-201...

CVE-2015-0239
Published: 2015-03-02
The em_sysenter function in arch/x86/kvm/emulate.c in the Linux kernel before 3.18.5, when the guest OS lacks SYSENTER MSR initialization, allows guest OS users to gain guest OS privileges or cause a denial of service (guest OS crash) by triggering use of a 16-bit code segment for emulation of a SYS...

CVE-2014-8921
Published: 2015-03-01
The IBM Notes Traveler Companion application 1.0 and 1.1 before 201411010515 for Window Phone, as distributed in IBM Notes Traveler 9.0.1, does not properly restrict the number of executions of the automatic configuration option, which makes it easier for remote attackers to capture credentials by c...

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.