to block them but rather identify them. If someone that appears
to be using Comcast in San Diego shows to be a proxy, then the
chances of the transaction being fraud go from 2% to 99%. The
point is not to block - but identify suspicious transactions.
If we get an order from a university, we'll give it more
scrutiny, but not necessarily block it.
--
Nitzan Kon, CEO
Future Nine Corporation
www.future-nine.com
--- On Tue, 8/19/08, Chris Bagnall <lists@minotaur.cc> wrote:
> Given that quite a few universities and even a few ISPs
> insist on using transparent proxies to route HTTP traffic,
> aren't you running the risk of blocking legitimate users
> if you're blocking *all* traffic that comes via an HTTP
> proxy?
>
> I can see the logic in blocking open/compromised proxies,
> but blocking all proxies seems a bit drastic.
>
> Regards,
>
> Chris
_______________________________________________
--Bandwidth and Colocation Provided by http://www.api-digital.com--
AstriCon 2008 - September 22 - 25 Phoenix, Arizona
Register Now: http://www.astricon.net
asterisk-biz mailing list
To UNSUBSCRIBE or update options visit:
http://lists.digium.com/mailman/listinfo/asterisk-biz
No comments:
Post a Comment