Harvesting experiment (2)
This Web page is a second experiment on how/whether electronic
addresses contained in Web pages are harvested by certain unscrupulous
organizations. (The only difference with the first experiment is that
we now use randomly-generated, hard-to-guess e-mail addresses. In the
first experiment, the addresses differed only by their last character
and could therefore have been derived from one another.)
Do not send messages to any of the addresses contained below, these
will bias the results.
Put online 2004-12-10. Experiment closed 2006-09-24.
- Method 0 (
mailto
in clear)
nsegost0@estephe.inria.fr
First spam received 2004-12-13. (+3 days).
- Method 1 (
mailto
in clear with +)
sitcurn1+tag@estephe.inria.fr
No spam to this address, but a lot to the invalid address
tag@...
.
- Method 2 (
mailto
with URL encoding + basic obfuscation)
ichmonf2 AT estephe DOT inria DOT fr
First (and only) spam received 2005-05-20. (Nigerian scam.) (+7 months).
- Method 3 (
mailto
with entity encoding)
forsing3@estephe.inria.fr.
First spam received 2004-12-22. (+12 days).
- Method 4 (
mailto
with entity encoding and URL encoding)
torecyc4@estephe.inria.fr.
First spam received 2004-12-22. (+12 days).
- Method 5 (plain text in clear)
fiancis5@estephe.inria.fr
First spam received 2004-12-13. (+3 days).
- Method 6 (plain text with +)
coneran6+tag@estephe.inria.fr
- Method 7 (plain text, basic obfuscation)
alifiet7 AT estephe DOT inria DOT fr
- Method 8 (plain text, entity encoding)
dlerick8@estephe.inria.fr
First (and only) spam received 2005-05-20. (Same Nigerian scam as method 2.) (+7 months).
- Method 9 (JavaScript)
When and by whom was this page first crawled?
googlebot.com
on 2004-12-11. (+1 day)
fastsearch.net
on 2004-12-11. (+1 day)
207.46.98.148
on 2004-12-12. (+2 days)
ask.com
on 2004-12-14. (+4 days)