
84 4 Anti-spam measures
stamp on every piece of e-mail he or she sends, and the recipient refuses to take
e-mails without an e-stamp, at least not e-mails from strangers. If strangers
try to e-mail without a stamp, they get a “bounce” back, telling them that
they need to put a stamp on their e-mail (or follow certain other guidelines)
to get the e-mail through. When the recipient gets a stamped e-mail, he or
she can forward the stamp along to their bank for redemption. The system
can be made even easier to implement if sites, rather than users, take on
the responsibility of putting stamps on e-mail. IBM, for example, is probably
willing to take responsibility, on behalf of its employees, to stamp their e-
mails or certify them as non-abusers. Templeton [171] discusses many more
conceptual, implementation and deployment issues. Loder et al. [101] discuss
these systems using the term “attention bond mechanisms” by introducing
a formal model, with which they attempt to capture the value structure for
e-mail messages for both sender and recipient. Their findings include that, in
certain cases, attention bond mechanisms leave recipients better off than even
an idealized or perfect filter, that costs nothing and makes no mistakes. An
example system is the concept proposed by Fahmann [53] where each recipient
can set his or her own price and where it is the recipient’s decision whether
to collect the fee or to decline payment. His solution has three parts:
1. Each e-mail account has an accept list (or whitelist) that is maintained by
the owner and that consists of the owner’s friends and associates. Messages
from people on this list are delivered without further ado.
2. The owner of an e-mail account can create interrupt tokens and provide
them to people and companies that might have some legitimate need to
contact the owner in the future. An interrupt token is a numeric code that
can be attached to a message, allowing it to be delivered.
3. Uninvited callers or e-mail senders must make a binding offer to pay an
interrupt fee to the recipient. The fee is, in effect, held in escrow. If the
call is completed and if the recipient chooses to collect the fee, the money
is transferred to the recipient’s bank account; if not, the fee is returned
to the sender, or is perhaps never collected in the first place.
The procedure is as follows: When a message arrives at the e-mail server, it
is examined. If the sender is on the recipient’s accept list (possibly including
senders of solicited bulk e-mail such as newsletters), the message is passed
through to his or her inbox. If the message header or body contains a “To-
ken:” field with a valid ten-digit interrupt token, it is likewise passed through
to the in-box. If the message contains no valid token, the sender receives a
machine-generated reply indicating that, where, and at what price, a token
may be bought to realize a binding offer. Limitations, drawbacks, and chal-
lenges involved with real cash systems include the following [171]:
Sender authentication is necessary to enable the recipient to reliably
distinguish e-mails sent by whitelisted persons from those sent by non-
whitelisted ones. As the envelope’s MAIL FROM as well as the header’s