Bramitam

Braimtam Online

bramitam - bramitam

Germany provides a secure way to deal with spam

Published on Sunday, March 06, 2011 // , ,

/doubleclick_ads.js?2531">     Sign in Application Development Applications Cloud Computing Data Center Data Explosion Mobile Technology Security Virtualization News Blog White Papers Webcasts Test Center Technologies Tech Watch Video Deep Dives More Feature The best hardware and software of the year

InfoWorld's 2011 Technology of the Year Awards recognize the best products at the forefront of today's top data center, desktop, mobile, and programming trends more

Latest Reviews HTML5 in the browser: HTML5 data communications Top 10 free open source tools for network admins InfoWorld review: Fabulous PHP frameworks HTML5 in the browser: Local data storage The best hardware and software of the year Test Center Home ChannelsApplication DevelopmentApplicationsCloud ComputingData CenterData ExplosionMobile TechnologySecurityThe Industry StandardVirtualization Topic CentersArchitectureBusiness IntelligenceComputer HardwareData ManagementGreen ITHTML5  MacMicrosoft WindowsNetworkingOpen Source SoftwareSOAStorage See all Technologies InfoClipzInfoClipz: Cloud computingInfoClipz: Green ITInfoClipz: Unified communicationsInfoClipz: Storage virtualizationInfoClipz: Server virtualization LineupsLatestNewsInfoClipzScreencastsAnalysisSponsored InfoWorld Video Home Face-to-FaceGaining Control of Your Enterprise Explosion See all Face-to-Face Virtual Conferences See all Virtual Conferences PopularAbout UsApps and ServicesAwardsEventsiGuidesInsider ArticlesIT JobsNewslettersQuizzesRSS and TwitterSlideshows Solution CentersDell EMC and Oracle 11G Innovative Efficiency Solutions CenterIBM Service Lifecycle ManagementIpswitch Managed File Transfer SolutionsIron Mountain Solving Information Management ChallengesManaging Risks in Virtualized and Cloud EnvironmentsRiverbed WAN OptimizationSymantec Small Mid Business SolutionsXerox Managed Print ServicesView all Solution Centers InfoWorld Home / Security / News / Germany provides a secure way to deal with spam March 04, 2011Germany provides a secure way to deal with spamBy demanding real-world identification from email senders, a new government-backed service may stop spam By Peter Sayer | IDG News ServicePrint |Add a comment

In theory, stopping spam is easy: just make it uneconomic to send millions of messages by charging for each one sent, or make senders authenticate their identity to stop address spoofing and simplify blocking.

In practice, that would involve building a secure, parallel email infrastructure linking electronic authentication with real-world identities: a daunting task. Yet that's just what Germany is about to do.

[ A recent report shows China is cleaning up its spam problem. | Master your security with InfoWorld's interactive Security iGuide. | Stay up to date on the latest security developments with InfoWorld's Security Central newsletter. ]

De-mail -- a play on the country-code abbreviation for Deutschland (Germany) and the word email -- is a government-backed service in which all messages will be encrypted and digitally signed so they cannot be intercepted or modified in transit. Businesses and individuals wanting to send or receive De-mail messages will have to prove their real-world identity and associate that with a new De-mail address from a government-approved service provider. The service will be enabled by a new law that the government expects will be in force by the end of this month. It will allow service providers to charge for sending messages if they wish.

Eliminating spam is not the primary purpose of De-mail -- in fact, service providers will be legally obliged to deliver every De-mail message, without blocking any, just as the postal service is not supposed to throw away your mail.

But the proportion of spam in De-mail is likely to be much lower than in regular Internet email, of which 77.6 percent was spam in January, according to Kaspersky Labs. That's because De-mail's requirement that senders identify themselves will make it riskier to promote fake pharmaceuticals and illegal pyramid investment schemes, while any charges to send messages will make spamming less profitable.

The identity requirement will also make it easy for recipients to filter and block unwanted De-mail messages -- there is no legal obligation to read them, after all. Filtering is also possible with regular Internet email, but less reliable because of the possibility of address spoofing.

Messages sent through the De-mail service will have the same legal protection and status as paper mail, making it possible to send the equivalent of recorded delivery mail and obtain a legally valid receipt.

On the technical side, De-mail will use existing Internet standards, carrying messages over encrypted connections between dedicated SMTP (Simple Mail Transfer Protocol) servers that only communicate among themselves, isolated from regular Internet mail servers. The law will require De-mail service providers to comply with strict technical specifications and to pass regular security audits.

Telecommunications operator Deutsche Telekom, corporate email provider Mentana Claimsoft and Internet service provider United Internet (owner of the brands GMX and 1&1) are promoting the future service at the Cebit trade show in Hanover, Germany, this week, as is the German Ministry of the Interior, backer of the scheme.

Deutsche Post, the German postal service, has also developed a De-mail service, according to Ministry sources, but Deutsche Post was showing only its ePostBrief secure webmail service, which is already on the market but is not interoperable with De-mail.

 next page › 12 Tags: email software, anti-spam, authentication Print |Add a comment Sign up for InfoWorld's Today's Headlines: First Look newsletter. Load MoreWhat are you thinking?Twitter search results powered byInsert this article url Tweet Related Content... Overcoming Eight Common Power Management Challenges | White paper A Practical Look at Data Center Sustainability | White paper Oracle Exadata Exceeds Expectations | White paper additional resources Webcast - Enabling the Database Cloud Webcast Enabling the Database Cloud Faced with static or shrinking budgets, IT organizations need to lower costs throughout the data center, while their business users demand a high quality of service - consistently fast response times, 24x7 availability, and comprehensive security. Improve Data Warehouse Performance by 10x.

Learn more »White Paper - Address Top Network Priorities with ANPM White Paper Address Top Network Priorities with ANPMRead EMA's independent assessment of Riverbed's Cascade compared against 18 other solutions. See how it ranked in terms of analyzing traffic data, overall architecture, security awareness and integration with CMDB/CMS and SIEM.

Read now » White Paper - Business Benefits of Collaborative Communications White Paper Business Benefits of Collaborative Communications Examine business scenarios and learn how unified communications can be leveraged to maximum competitive advantage. Discover how to ensure better connectivity between all individuals, fostering an environment that supports innovation through employee engagement across organizations, business units and companies.

Read now » White Paper - The Bandwidth Hunters: The Hunt for Better HD Telepresence White Paper The Bandwidth Hunters: The Hunt for Better HD Telepresence

Follow along as a mythical band of veteran IT professionals try to deploy high-definition (HD) telepresence on an enterprise-wide scale. Their biggest hurdle? They can't upgrade the network to handle more bandwidth. Other challenges include budget, reliability and user experience issues.

Read now » Sign In to comment 10 great error messages 20 years of innovative Windows malware Can the Atrix 4G really become your next PC? How, where, and when IT pros cheat Welcome to the iPad 2: Inside Apple's new tablet Recommended ResourcesWebcast: Best Practices for DDoS Mitigation | WebcastGuide to Insider Threat Protection | WebcastData loss prevention | WebcastA Brief History of Malware | WebcastLearning to Love your Log Files | WebcastHow to Choose a Qualified Security Assessor | White PaperNext Generation of Cybercrime | White PaperPCI 2.0: What's New? What Matters? What's Left? | White PaperRealtime Publishers: The Business Case for Security Information Management | White PaperFoundations of Security Information Management | White PaperSee all White Papers / WebcastsRecommended Resources Today's Headlines: First Look Newsletter

Find out what will be news for the day, with our first-thing-in-the-morning briefing.

/* powered by sh */#wrapper #sh_job_widget .sh_powered_by { margin-top:0; text-align:right; font-size:1.1em; line-height:1.2em; padding-top:0.3em; }#wrapper #sh_job_widget .sh_powered_by a { text-decoration:none; }#wrapper #sh_job_widget .sh_powered_by .sh_blue { color:#00ACF1; }#wrapper #sh_job_widget .sh_powered_by .sh_green { color:#A6CE3A; } See All Jobs » Post a job for $295 » Go Jobs powered by SimplyHired Test drive the world’s leading SSL for free at verisign.com/ssl/free-trialSign up for a free 30-day trial of Cisco Show and Share!ManageEngine: End-to-End Java Performance Management. Download Product Now!Transform with Mobile AppsMaximizing Business Application FunctionalityIPv6: Complete these 5 Steps to PrepareComparing Private Line, Frame Relay, ATM, Ethernet and IP VPNsLearn how Red Hat delivers modern message-oriented integration with AMQPHP BladeSystem powered by AMD Opteron™ 6100 Series processorsSymantec Security Webcast Series: Protection for the Modern EnterpriseEMC Power, Iomega Price! VMware-certified network storage, 2-24TB.Focus on Business. Let Rackspace Manage Your Cloud.New guide shows you how to accelerate unified communications ROI.Eaton's Intelligent Power® Software Suite, all the tools you need to monitor and manage power devices on your network.ERwin® in the Cloud: How Data Modeling Supports Daas ImplementationsOnly protect the information you need with Symantec Backup Exec.Discover how to make e-discovery easier. Find out now.One number. One voicemail. Sprint Mobile Integration.iTKO - The DevTest Cloud: Virtual software labs eliminate constraintsLive Webcast: Don’t Fire Your Firewall Read the white paper on fast iPad and iPhone developmentHP ProLiant FlexFabric enabled server powered by Intel® Xeon®Accurate time synchronization - Symmetricom's network time servers.Mobility Applications Before and AfterKeep Your Enemies Closer: Get Proactive about SecurityFirewall podcast Q&AsChoosing the Right Metropolitan Ring For Your BusinessThis year, go Beyond the Hour at www.earthhour.org/beyondthehour.Go on the offense with a proactive IT security defense.Unleash the Power and Performance of Physical and Virtual DesktopsPower Your Applications with Rackspace CloudGet Proof. Not Promises! Take the Netezza TestDrive..The SMB IT Decision Maker's Guide: Choosing a SaaS Service Management SolutionWith Xerox, you'll be ready for real business. Find out how>HP StorageWorks D2D2500 Backup System with Intel® Xeon® 5500 seriesKnow where your sensitive data is with Symantec Data Loss PreventionKnow the biggest risks to your small business. Find out now.Protect 500 virtual machines in 17 minutes with CommVault® Simpana® software!How are YOU investing in efficiency? Check out CIO Debate today and compare your strategies against your peers.Why Virtualize?
About Us| Advertise| Contact Us| Newsletters| Privacy Policy| Reprints, Permissions, Licensing| Terms of Service| About AdChoices The IDG Network CFOworld| CIO| Computerworld| CSO| DEMO| GamePro| Games.net| IDC| IDG| IDG Connect| IDG Knowledge Hub| IDG TechNetwork| IDG Ventures| InfoWorld ITwhitepapers| IT World| JavaWorld| LinuxWorld| Macworld| Network World| PC World

--> ©1994-2011 Infoworld, Inc.

View the Original article

Subscribe to our RSS Feed! Follow us on Facebook! Follow us on Twitter! Visit our LinkedIn Profile!