June 8 • MONDAY | |||
Chairs and Moderators Review + Town Hall | |||
What to See & Do around Dublin | |||
Email Authentication & DMARC | |||
Securing Your Home Network, Personal Computers and Mobile Devices | |||
Maximizing Group Collaboration | |||
Guide Prep Meeting | |||
Investigating SMS Spam, Case Studies – A Regulatory Approach | |||
Pretty Good Privacy (PGP)/GNU Privacy Guard (GPG): Just Enough Training To Make You DangerousSr. Tech Advisors: Joseph St Sauver PGP/GPG is widely used in the operational security community to protect messages all the way from their origin to their final destination, i.e.,ʺend-to-end.ʺ The number of people who actually routinely use PGP/GPG remains rare, however, largely due to its perceived complexity. This training session will give you just enough PGP/GPG skills to let you become minimally functional, while skipping esoteric options and more theoretical considerations. You will learn how to create your own keypair, obtain others' public keys, and send and receive PGP/GPG signed and encrypted messages. Suitable for Mac, PC and Unix/Linux attendees. No prior crypto instruction expected. | |||
M³AAWG Growth and DevelopmentChairs: Michael Adkins TThis is a kick-off meeting to streamline a more effective growth and engagement effort - How do we recruit new members? How do we get them involved once they show up? | |||
New Attendees OrientationSpeakers: Alyssa Nahatis A brief meetup of guides before the New Attendee Orientation starts. We'll discuss the goals of the guide program, and some items we hope you will discuss with your guidees. This is not just for SF Guides, but also for future potential Guides. | |||
June 9 • TUESDAY | |||
Open RoundtablesModerators: Jordan Rosenwald (Comcast), Melinda Plemel (ReturnPath), Michael Goldman (Facilitation First), Vincent Schonau Facilitated round table discussions, open to all M3AAWG members, where new ideas can be incubated and best practices discussed. Day1 collects input from as many people as possible about three of the topics that interest you. Day 2 builds on the collected input from Day 1 to decide on work that can be carried forward into future content and/or investigations. Be sure to submit any ideas for Dublin ORT topics at /submissions | |||
Chairman opening & Mary Litynski AwardModerators: Jerry Upton (M3AAWG), Michael Adkins Welcome by the Chairman followed by an early presentation of the 2016 Mary Litynski award. In 2010 M3AAWG and the Internet industry as a whole lost a great friend and supporter, Mary Litynski. To honor her behind-the-scenes efforts and commitment, we have created an annual award to recognize an individual who has significantly contributed to making the Internet safer for all. | |||
Marketing BoFModerators: Jerry Upton (M3AAWG) We're looking for all marketing types, bloggers and social media troupers, with or without experience, from anywhere in the world: You’ve seen all the exceptional work that’s being done at M3AAWG and you’d like to be part of getting the word out about it. Join us to brainstorm new ideas in our new Marketing Committee. We'd like your input on new marketing ideas during the BoF and then, hopefully, your continued involvement. Please also invite any marketing, public relations or social media people in your company you think should participate. For information, contact Linda Marcus, M3AAWG public relations, at LMarcus@astra.cc and M3AAWG Executive Director Jerry Upton at jerry.upton@m3aawg.org.
| |||
Combatting Abuse of At-Risk GroupsModerators: Jamie Tomasello (Access) This session provides a perspective into the threats, abuse and security issues that at-risk civil society actors and users, such as activists, journalists and NGOs, are dealing with and how platforms and service providers of social, email and mobile services are being mis-used by the malicious actors to get to these sensitive groups. The session will explore which features and processes may be causing issues for civil society actors and opportunities for creating feedback to these platforms and service providers to learn how their services are used and depended upon by civil society actors. | |||
Why DANE? - One Year of DANE - Tales and Lessons LearnedModerators: Janet Jones (Microsoft), Alex Brotman The Pervasive Monitoring SIG is working to determine next steps for securing email in transit post Opportunistic TLS deployment in order to mitigate Man-in-the-Middle (MITM) attacks where possible. During this session you will hear lessons learned around DANE post deployment and understand why it is an important standard. and some common uses for DANE, such as helping secure email and jabber. | |||
Into the mindset of Volatile CedarModerators: Paul Ferguson (Trend Micro, Inc.) Volatile Cedar is a campaign with possible Lebanese origins that had been targeting hosting companies, telecommunications, media, defense contractors and educational institutions worldwide for over the past 3 years. This campaign, led by a persistent attacker group, has successfully penetrated a large number of targets using various attack techniques. This talk will try to get into the mindset of the attackers by examining a real use case of an attacked target. We will follow the intelligence data, timelines and other evidence to try and understand what and how the attacker was trying to achieve.
| |||
Building Bridges with Developing EconomiesModerators: Andre Leduc, Industry Canada The Internet has linked the world in ways thought unimaginable 25 years ago. Progress is not even, though, and many economies remain burdened by spam, botnets, inadequate bandwidth and other impediments to a resilient Internet. This panel will explore the challenges faced in different economies, searching for practical solutions to deliver on the promise of a connected and robust global network. | |||
Practical Phishing Defenses for ESPs“No presentation for posting” Moderators: Paul Kincaid-Smith As defenses against spam have grown stronger over time, sophisticated abusers have sought ever softer targets. Attackers are now focusing resources on the theft of credentials from authorized users of ESP accounts and ESP employees, and once compromised, using those accounts to send spam and launch other attacks. Successful attacks not only help the thieves circumvent reputation-based defenses against abuse, but degrade the hard-won reputation of the compromised sender. In this session, our ESP panelists will share their war stories and experiences - successful and otherwise - of their efforts to detect and disarm phishing attacks of ESP customer or employee credentials, and how they were able to recover afterwards. | |||
The Attack of the Killer TomatoesModerators: Paul Ferguson (Trend Micro, Inc.) The presentation will take a peek inside the development process of an active APT group using a campaign, named Rotten Tomato, that spans several months from August 2014 to March 2015. During this campaign, we were able to observe the sophisticated development of the infamous Plugx backdoor. But in parallel to that, we will demystify the APT group by showing the lack of understanding of the exploits they were using in distributing the malware. | |||
PixelVault: Securing Cryptographic Operations Using Graphics ProcessorsModerators: Manos Antonakakis Speakers: Michalis Polychronakis Protecting the confidentiality of cryptographic keys in the event of partialor full system compromise is crucial for containing the impact of keyleakage attacks. The Heartbleed vulnerability of April 2014, which allowedthe remote disclosure of secret keys from HTTPS web servers, is anindicative example of such a catastrophic event. In this talk, I willpresent our recent work on PixelVault, a system for keeping cryptographickeys and carrying out cryptographic operations exclusively on the GPU, whichallows it to protect secret keys from leakage even in the event of fullsystem compromise. We have implemented a PixelVault-enabled version of theOpenSSL library that allows the protection of existing applications withminimal modifications. Based on the results of our evaluation, PixelVaultnot only provides secure key storage using commodity hardware, but alsosignificantly speeds up the processing throughput of cryptographicoperations for server applications. | |||
Private Rights of Action Against Spammers: Adding cops to the beatSpeakers: Kelly-Anne Smith (CRTC), Betsy Broder (FTC), Aaron Foss, (Nomorobo), John McHugh (Sr Mgr EMEA Investigations, Digital Crimes Unit, Microsoft) Are private rights of action against spammers effective? Although some strongly support such measures as part of a broader set of tools to fight spam, others are indifferent, citing the unproven effectiveness in deterring spam, while still others oppose them on the grounds that government is better placed to enforce laws against spam. This panel will explore the private right of action tool as defined and/or used in their jurisdiction and discuss its benefits in the fight against spammers. | |||
DMARC: Deployment, Recent Developments, and Domain-based ReputationModerators: Severin Walker (Comcast) This panel will feature an update on DMARC and the growing importance of domain-based reputation, as well as implementation experiences from senders and receivers. Panel includes speakers from a UK government agency and a global mailbox provider who have successfully implemented DMARC, and the director of DMARC.org. | |||
Security Analysis of Embedded FirmwareModerators: Manos Antonakakis As embedded systems are more than ever present in our society, their security is becoming an increasingly important issue. However, with many recent analysis of individual firmware images, embedded systems acquired a reputation of being often insecure. Despite these isolated examples, we still lack a global understanding of embedded systems security as well as the tools and techniques needed to support such general claims. In this talk, we present the first public, large scale, analysis of firmware images. In our experiments we unpacked 32K firmware images into 1.7M individual files, which we then statically analyze. We leverage this large scale analysis to bring new insights and outline several open challenges when performing such experiments. We also show the main benefits of looking at many different devices at the same time and of linking our results with other large scale datasets, such as the ZMap SSL collection. We discuss results that would not have been possible to achieve without such a wide-scale analysis. In summary, without performing sophisticated static analysis, we discovered a total of 38 previously unknown vulnerabilities in over 693 firmware images. Moreover, by correlating similar files inside apparently unrelated firmware images, we were able to extend some of those vulnerabilities to over 123 different products. We also confirmed that some of these vulnerabilities altogether are affecting at least 140K devices accessible on the public Internet. | |||
2020: SESSION MOVED TO HERBERT/PEMBROKE ROOMTHIS SESSION HAS BEEN COMBINED WITH THE aBUSE IN THE DUTCH HOSTING PROVIDER MARKET AT THE REQUEST OF THE PRESENTERS. THE COMBINED SESSION WILL BE IN THE HERBERT/PEMBROKE ROOM. | |||
Abuse in the Dutch Hosting Provider Market AND 2020: Welcome to a Spam-Free World! How did we get here?Speakers: Michel van Eeten, Pepijn Vissers We present an approach to develop reputation metrics for the security of hosting providers. The existing security rankings are based on limited sources of abuse data. More importantly, they do not adequately take into account the size of hosting providers. | |||
June 10 • WEDNESDAY | |||
Open RoundtablesModerators: Jordan Rosenwald (Comcast), Melinda Plemel (ReturnPath), Michael Goldman (Facilitation First), Vincent Schonau Facilitated round table discussions, open to all M3AAWG members, where new ideas can be incubated and best practices discussed. Day1 collects input from as many people as possible about three of the topics that interest you. Day 2 builds on the collected input from Day 1 to decide on work that can be carried forward into future content and/or investigations. Be sure to submit any ideas for Dublin ORT topics at /submissions | |||
Keynote: The Economics of Botnet MitigationSpeakers: Michel van Eeten he fight against botnets has been going on for over a decade, but they still impose significant cost on society. Internet Service Providers (ISPs) have become increasingly central to the effort, as they can undertake mitigation more economically efficiently than end users. This paper evaluates the role and performance of ISPs in mitigation. We employ three datasets of infected machines and map these to ISPs in 60 countries to measure the number of infections per subscriber. We find that ISPs are indeed control points and that they differ significantly in infection rates, even when operating under the same competitive pressures. We also find that national anti-botnet initiatives have had a positive, albeit limited, impact so far. The differences in performances can partially be explained by measures that reduce the cost of mitigation, partially by institutional factors, and partially by regulatory pressure. We discuss the implications of these lessons for cybersecurity policies. | |||
Collaboration Committee Chairs & Abuse Desk SIG Chairs BoFModerators: David Romerstein (Apple), Angela Knox, Sara Roper Chairs Lunch BoF- Invite Only | |||
BoF- When your lightbulb starts to do morse code… badness and the Internet of Things.MModerators: Michael O'Reirdan (Comcast) In all seriousness, lets talk about what are the emerging issues for service providers and other M3AAWG members. Although much hyped, there are and will continue to be real security problems here and whilst some will be addressable by current techniques, we may need to take new approaches to manage the issues that surface here. This may be a kick off for some serious work, there are definitely malware and messaging issues to be addressed. | |||
Spamhaus Users BoFSpeakers: Spamhaus Team Spamhaus users are invited to join Spamhaus team members at lunch for an informal discussion of our current data-sets, methods being used to prevent spam & abuse, and to go over ways where using Spamhaus in ones environment can be improved or upgraded. There will be time for questions and feedback from attendees. | |||
Training Committee BoFModerators: Annalivia Ford, Vincent Schonau, Udeme Ukutt M3AAWG Training sessions have become an integral part of the value at our meetings. We are looking for additional participation from the M3AAWG membership to continue this momentum and ensure we are providing training on topics of interest to all M3AAWG attendees. Join us during lunch and share your thoughts and ideas. | |||
The Russian Data Protection Law and Other EU updatesModerators: Bill Wilson (M3AAWG) A new law In Russia goes into effect September 2015 and requires data to be stored inside Russia. Plus other European Union regulatory updates. | |||
Redirector Abuse and RemediesModerators: Ryan Harris ESPs and their customers rely on redirectors to provide their customers with message performance data. Recently, bad actors have identified and abused a number of redirector vulnerabilities and loopholes that permit them to piggyback onto the target ESPs sending reputation and circumvent domain and content reputation filters in order to send abusive mail. The panel will describe specific vulnerabilities identified during those attacks, how they were corrected, and methods of monitoring to identify and pre-empt new attacks. | |||
Spam and Child Abuse Material:The connection“Presentation not available for posting” The anti-spam community can play a vital role in stopping the distribution of Child Abuse Material (CAM). This workshop will give you the knowledge to deal with a CAM incident on your network, and will help you understand the impact of your actions, when dealing with an incident, on the child, law enforcement, your fellow professionals and your network. | |||
Designing a Whitehat Platform from the Ground UpModerators: Paul Kincaid-Smith Opinionated product decisions become guardrails for your customers. Senders' Committee presents a case study on the planning and build-out of an automated marketing platform from scratch, with anti-abuse requirements as a key design component. Topics to be addressed include:
| |||
Overview of The Equation Group | |||
Sending Email in the European UnionModerators: Bill Wilson (M3AAWG) Email senders who are sending to various countries in the European Union have to deal with 28 different legislation and jurisdictions. Come learn more about the EU opt-in regime and the EU eCommerce and Data Protection Directives. | |||
Quantification of Damages Best Practices Working Session“No presentation for posting” A working session on developing a best practices document that quantifies the damages suffered by companies by various types of cyber-attack. There was a kick off meeting in Boston. | |||
Lizard Squad and The Skids who Stole Christmas“Presentation not available for posting” Deloitte's Threat Intelligence group has been conducting research into attention motivated hacking groups. They have also been studying their behaviors and the culture they arise from, and performing attribution on some of the more prominent individuals. In this talk we will discuss Lizard Squad, their high profile attacks against companies and private individuals, and what this means for the future of attention motivated hacking. | |||
Abuse Desk ToolsModerators: Autumn Tyr-Salvia (Message Systems) What are the necessary tools of the trade to set up a good abuse desk? How do you decide whether to build something internally or to look for an outside product? When do you share tools with other teams, and when does it make sense to get your own? Representatives from different types of abuse teams (sender, ISP, hosting provider) will discuss what types of tools they use, their experiences building and implementing them, and share lessons learned. Same broad subject we discussed in San Francisco, but with new speakers and new information. | |||
SS7 Attacks and Defences – Defending the (mobile) core“Presentation not available for posting” This talk will give an overview of recent reported techniques and attacks over the SS7 protocol, the core signalling network that controls and co-ordinates all mobile operators worldwide. This network is used by more people than the internet, but security in it is known to few. AdaptiveMobile will give an overview of how and why attacks can be executed, and ways in which they can be defended. | |||
M³AAWG/LAP/CAUCE Omnibus Best Practices Update highlights - OPERATION SAFETY-NETSpeakers: Andre Leduc, Industry Canada Chairs: Neil Schwartzman (CAUCE) In October 2012, LAP and M³AAWG prepared and submitted to the OECD Consumer Protection Committee a plain language report entitled “Best Practices to Address Online and Mobile Threats.” Often referred to as the OECD Best Practices Report, it was one of the first, and best, global efforts to encourage the adoption of best practices to address a variety of online and mobile challenges. Much has changed in the three intervening years. With the input from more than 100 industry and public sector leaders, the collaborative has produced a revised version, which includes updates to the four original sections, and added discussions of VoIP fraud, Caller ID Spoofing, abuse issues at Hosting and Cloud Services Providers, and a side-bar focused on online harassment. Among the current problems we are addressing are DDoS attacks and data breaches. | |||
June 11 • THURSDAY | |||
Brand SIG Closed SessionModerators: Kurt Andersen (LinkedIn), Franck Martin This Brand SIG closed session provides an opportunity to exchange sensitive information related to the current abuse issues participants are experiencing. Typically, participants are focused on abuse rather than delivery issues. M3AAWG members who believe they meet the requirements (an employee of an end-user facing brand that is not an ISP, ESP or vendor) should submit a request to join the Brand SIG through the All Groups page on the M3AAWG members-only website or contact one of the session moderators. | |||
Identity Management SIG Document Working SessionSr. Tech Advisors: Joseph St Sauver M3AAWG's Identity Management Special Interest Group has been working on a document around password management practices for providers and for end users. This session will be a final review of the draft document that has been refined over the past year before the document is submitted for publication. | |||
Case Study - Analysis of SSL certs in the SMTP world (Yahoo)Moderators: Janet Jones (Microsoft), Alex Brotman There has been a push for email providers to implement STARTTLS for MTA transport security over the last few years, but, TLS in SMTP is not used the same way compared to HTTPS. Self-signed and expired SSL certificates are not uncommon with SMTP. Recently, we scanned over 1 million domains to analyze SSL certificates and determine STARTTLS maturity in the SMTP world. This session will be to share some of our findings on 1) STARTTLS maturity level - domains that support STARTTLS (and not), 2) Domains with self-signed SSL certificates, exired certificates and CA issues certificates, 3) Domains with 3rd party hosting (ex. Google, Yahoo, etc.), 4) Certificate specifics - CN, SAN certificate chain validations, negotiated ciphers and key length, and other interesting metrics of interest. This session is in support of the Pervasive Monitoring SIG efforts to improve MTA to MTA transport security and will provide a good baseline in terms of STARTTLS and SSL certificates used in SMTP. | |||
VBA Revived!Moderators: Paul Ferguson (Trend Micro, Inc.) Back in the 1990's, VBA (Visual Basic for Applications) was a serious player in the malware game in the form of viruses, such as the infamous Melissa virus. Fast-forward to 2013, and macro malware could be considered practically extinct. In recent months, however, VBA has been re-vitalised as the perfect method of delivering malware to endpoint systems. In this talk we will analyse the reasons behind this sudden re-emergence, look at what malware families are utilizing them (such as Dridex), and discuss what measures the AV industry is taking to prevent them. | |||
Hosting SIGModerators: Justin Lane (Bluehost), Matthew Stith (Rackspace) This is a open session for Hosting SIG we will be looking at what area we should be focusing on next in order to keep producing material that will continue moving our mission forward. | |||
The Enduring Challenge of Traffic AnalysisModerators: Janet Jones (Microsoft), Alex Brotman Sr. Tech Advisors: Joseph St Sauver M3AAWG member companies have made huge strides when it comes to improving customer privacy through the use of encryption. For example, over 80% of the email that is emitted from Google is now encrypted, as shown on their Safer Email page. However, to-date the M3AAWG community has largely ignored traffic analysis and bulk collection of metadata. When it comes to email or voice traffic, traffic analysis is the analysis of message source and destination, message frequency, message duration, and every other message characteristic *except* for consideration of the message body itself (and the content of the message subject header). Traffic analysis may not sound particularly powerful, but in fact, traffic analysis can be hugely revealing. This talk will describe the traffic analysis problem, explain its importance, and suggest a scalabe and easily implemented means by which ISPs can protect customers' email and voice traffic from bulk collection of metadata and traffic analytic attacks. | |||
Public Policy Working Session | |||
Technical Chairs BoFModerators: Paul Ferguson (Trend Micro, Inc.) Technical Chairs BoF- Invite Only | |||
Data Sharing: What to do, What not to do“No presentation for posting” Data sharing is a hot topic these days, whether it's FBLs or spamtrap data or reputation data. What are some benefits of data sharing? What are the pitfalls? What kind of data should be shared? What should not be shared? How can you make the best use of shared data? These questions will be answered by a panel of experts with diverse experiences in sharing many different kinds of anti-abuse data. | |||
RIPE NCC & Community: An introduction to their Place in the Anti-Abuse WorldModerators: Angela Knox, Sara Roper The RIPE NCC is the Regional Internet Registry for Europe, the Middle East and parts of Central Asia. The RIPE Community is the wider, open forum who who form working groups to ensure the administrative and technical coordination necessary to enable the operation of the Internet. Both of these groups are tightly bound up with fighting network & services abuse. This talk will outline current activities undertaken by both the NCC and the wider RIPE Community including interactions with law enforcement; the present and future for abuse-c; tools such as RIPE Stat and the RIPE Atlas network and how RIPE Policy is formed and how you can be involved. Mirjam Kuehne is the RIPE Labs Community Builder at the RIPE NCC. Her colleague Ivo Dijkhuis is the Information Security Officer. Brian Nisbet is the Co-Chair of the RIPE Anti-Abuse Working Group. | |||
Evolution of Customer Security Event ManagementSpeakers: Matthew Moleski (Comcast) This session revisits our look at the evolution of the abuse desk from its former guise and through the growth and availability of big data and the expansion of roles and responsibilities of this area to include fraud, identity and risk management in general. A look at where we are now and where we might be headed in the future. | |||
Code Injection and Reuse Payloads in Memory Error ExploitsModerators: Manos Antonakakis Today's most widely exploited applications are the web browsers and documentreaders we use every day. The immediate goal of these attacks is to compromisetarget systems by executing a snippet of malicious code in the context of theexploited application. Technical tactics used to achieve this can beclassified as either code injection — wherein malicious instructions aredirectly injected into the vulnerable program — or code reuse, where bits ofexisting program code are pieced together to form malicious logic. In thistalk, we present a new code reuse strategy that bypasses existing and up-and-coming mitigations, as well as methods for detecting attacks by identifyingthe presence of code injection or reuse payloads. More specifically, our new code reuse strategy, dubbed just-in-timeexploitation, exposes the limitations of contemporary fine-grained addressspace layout randomization as well as all other widely deployed mitigations.In doing so, we motivate the need for detection of such exploits rather thansolely relying on prevention. To address that need, we also discuss two newtechniques for detecting attacks by identifying the presence of a payload.Code reuse payloads are identified by first taking a memory snapshot of thetarget application, then statically profiling the memory for chains of codepointers that reuse code to implement malicious logic. Code injectionpayloads, on the other hand, are identified with runtime heuristics thatleverage hardware virtualization for efficient sandboxed execution of allbuffers in memory. We close with ideas for future work. | |||
Peeking behind the curtains of the Malvertising problemSpeakers: James Pledger Malvertising has become an increasingly pervasive threat to consumers over the last decade. Since many large web properties rely on advertising for a significant amount of their income, threats to this ecosystem have a significant impact to not only the web properties themselves, but the advertisers themselves. This talk will give incident responders and analysts an overview of the advertising ecosystem, focusing on the different components that attackers focus on. We will go over the different components of the advertising ecosystem and how they interact with each other, such as demand side platforms, supply side platforms, ad networks as well as exchanges. This portion will be interactive, so bring your questions. After this, we will go into real world threat types that are seen on a regular basis. Time permitting, we will go into a few examples of malvertising that we have seen in the wild over the last 90 days. | |||
Statistically Modeling APT attacks, from the perspective of a practitionerModerators: Manos Antonakakis Speakers: Jeremy Demar The dangers posed by advanced persistent threats (APT) are well known to the security community, but nearly all of the work to detect and analyze them has been fully manual, and largely done by industry. As APTs become more of a concern, we must move beyond manual detection efforts. This talk will focus on three hard problems; (1) how can we forensically reason about APT events, (2) how can we efficiently mine, detect and model such APT attacks using vast datasets, and finally (3) what is the role of a modern threat analyst in the effort to statistically model such APT attacks. Instead of mathematical terms and models, we will use practical examples of real APT threats (and various data points that describe them) to argue about these three points. We aim to conclude this talk by summarizing the most common pitfalls we saw in practice when we tried to model APT threats. | |||
BCP discussion about NSP/ISP filtering of destination port 1900 SSDP and other portsChairs: Sara Roper SSDP (Simple Service Discovery Protocol) is a the discovery protocol of UPnP (Universal Plug and Play) intended for use in residential and SOHO LAN networks. Many common HSI/Cable devices have allowed this protocol on the WAN level as well. In a perfect world, the modems would have this protocol disabled or filtered, however, reality is that the incredible volume of modem manufacturers, types, versions, and ability for an ISP to remotely manage these devices makes disabling SSDP on the Internet cost, time, and resource prohibitive. So, in order to reduce the impact of reflective DDoS attacks due to this vulnerability, NSPs and ISPs should consider filtering or limiting destination port 1900, and possibly limiting source port 1900 based on packet size. Much like M3AAWG supports port 25 filtering, supporting port 1900 filtering or limited can be an effective anti-abuse strategy for NSPs and ISPs. This session will discuss the creation of a possible BCP to support this strategy. | |||
Tales from a Spamtrap CollectionModerators: Paul Kincaid-Smith Come learn about mail flowing to hundreds of thousands or millions of spam traps. What categories of mail hit these traps? What are the trends? How do spammers evade major public blocklists and spam filters? What practical steps can responsible ESPs and mailbox providers take to detect and limit spam? Atro Tossavainen shares insights of a long-time spam trap operator. | |||
Chairman's ClosingModerators: Jerry Upton (M3AAWG), Michael Adkins Meeting closing with Committee highlights and a brief set of important announcements from the M3AAWG Chairman and Executive Director | |||
